6th International ICST Symposium on Modeling and Optimization

Research Article

Modelling Co-operative MAC Layer Misbehaviour in IEEE 802.11 Ad Hoc Networks with Heterogeneous Loads

Download663 downloads
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.3178,
        author={Rohith Dwarakanath Vallam and A. Antony  Franklin and C. Siva Ram Murthy},
        title={Modelling Co-operative MAC Layer Misbehaviour in IEEE 802.11 Ad Hoc Networks with Heterogeneous Loads},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={Ad hoc networks  Calculus  Delay effects  MATLAB  Mathematical model  Mobile ad hoc networks  Probability  Sampling methods Sequential analysis Time measurement},
        doi={10.4108/ICST.WIOPT2008.3178}
    }
    
  • Rohith Dwarakanath Vallam
    A. Antony Franklin
    C. Siva Ram Murthy
    Year: 2008
    Modelling Co-operative MAC Layer Misbehaviour in IEEE 802.11 Ad Hoc Networks with Heterogeneous Loads
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.3178
Rohith Dwarakanath Vallam1, A. Antony Franklin1, C. Siva Ram Murthy1,*
  • 1: Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai - 600036, India.
*Contact email: murthy@iitm.ac.in

Abstract

Misbehaviour due to back-off distribution manipulation has been one of the significant problems faced in IEEE 802.11 wireless ad hoc networks which has been explored recently by the research community. In addition, collusion between misbehaving nodes adds another dimension to this security problem. We examine this problem in a three-node network scenario wherein two nodes are assumed to be malicious colluding adversaries causing unfair channel access to the other legitimate node. The misbehaving nodes, through back-off manipulation, will try to minimize the channel access share got by the legitimate node and at the same time maximize the detection delay to detect such an attack. We explore this problem and its solution, analytically, in a non-saturated setting, by modelling a single IEEE 802.11 node as a Discrete Time Markov Chain (DTMC) and suggest a measure for evaluating fairness in the network. We then propose an attacker-detector non-linear optimization model through which the joint optimal attacker distribution is evaluated by applying results from the area of variational calculus. We finally use the Sequential Probability Ratio Test (SPRT) for estimating the average number of samples for detecting colluding adversaries in the network. We validate all the models using MATLAB and verify the model results by sampling values from the evaluated optimal attacker distribution using a robust statistical library called UNU.RAN.