5th International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks

Research Article

A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access

  • @INPROCEEDINGS{10.1109/WIOPT.2007.4480053,
        author={Yalin Evren Sagduyu and Anthony Ephremides},
        title={A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access},
        proceedings={5th International ICST Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={3},
        keywords={Computer crime  Cost function  Delay  Feedback  Media Access Protocol  Nash equilibrium  Pricing  Throughput  Transmitters  Wireless networks},
        doi={10.1109/WIOPT.2007.4480053}
    }
    
  • Yalin Evren Sagduyu
    Anthony Ephremides
    Year: 2008
    A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access
    WIOPT
    IEEE
    DOI: 10.1109/WIOPT.2007.4480053
Yalin Evren Sagduyu1,*, Anthony Ephremides1,*
  • 1: Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland, College Park, MD 20742, USA
*Contact email: sagduyuy@eng.umd.edu, tony@eng.umd.edu

Abstract

We consider a random access system of non-cooperative selfish transmitters with the individual objectives of jointly optimizing throughput rewards, energy and delay costs. Our goal is to evaluate the effects of malicious nodes that have the dual objectives of blocking the packet transmissions of the other selfish nodes as well as optimizing their individual performance measures. We assume saturated packet queues of infinite buffer capacities and consider a general multi-packet reception channel that allows packet captures in the presence of multiple simultaneous transmissions. We formulate a non-cooperative random access game of selecting individual probabilities of transmitting packets to a common receiver and derive the transmission strategies in non-cooperative Nash equilibrium depending on the throughput rewards, energy and delay costs. The analysis provides insights for optimal strategies to block random access of selfish nodes as well as optimal defense mechanisms against possible denial of service attacks of malicious nodes in medium access control layer of wireless networks. In addition, we compare the results with the cooperative equilibrium strategies that optimize the total system utility and present a pricing scheme to improve selfish operation. For distributed implementation, we formulate a repeated game of the best response strategy updates and also develop an adaptive heuristic based on channel feedback only, if the system parameters are not explicitly known at the individual transmitter nodes.