Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach

被引:36
作者
Tang, Jin
Cheng, Yu [1 ]
Zhuang, Weihua [2 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
美国国家科学基金会;
关键词
Selfish misbehavior; real-time detection; IEEE; 802.11; CUSUM test; Markov chain model;
D O I
10.1109/TMC.2012.227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed nature of the CSMA/CA-based wireless protocols, for example, the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate their backoff parameters and, thus, unfairly gain a large share of the network throughput. In this paper, we first design a real-time backoff misbehavior detector, termed as the fair share detector (FS detector), which exploits the nonparametric cumulative sum (CUSUM) test to quickly find a selfish malicious node without any a priori knowledge of the statistics of the selfish misbehavior. While most of the existing schemes for selfish misbehavior detection depend on heuristic parameter configuration and experimental performance evaluation, we develop a Markov chain-based analytical model to systematically study the performance of the FS detector in real-time backoff misbehavior detection. Based on the analytical model, we can quantitatively compute the system configuration parameters for guaranteed performance in terms of average false positive rate, average detection delay, and missed detection ratio under a detection delay constraint. We present thorough simulation results to confirm the accuracy of our theoretical analysis as well as demonstrate the performance of the developed FS detector.
引用
收藏
页码:146 / 158
页数:13
相关论文
共 21 条
[1]  
[Anonymous], 2013, Network Simulator ns-2
[2]   Performance analysis,of the IEEE 802.11 distributed coordination function [J].
Bianchi, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (03) :535-547
[3]  
Brodsky B., 1993, NONPARAMETRIC METHOD
[4]  
Cagalj M., 2004, 2004017 LCA EPFL
[5]  
Koksal C.E., 2000, P ACM INT C MEAS MOD
[6]  
Konorski J., 2002, P 2 INT IFIP TC6 NET
[7]  
Konorski J., 2001, P 6 INT C PROT MULT
[8]   Selfish MAC layer misbehavior in wireless networks [J].
Kyasanur, P ;
Vaidya, NH .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (05) :502-516
[9]   Detection and handling of MAC layer misbehavior in wireless networks [J].
Kyasanur, P ;
Vaidya, NH .
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :173-182
[10]  
Morris J.R., 1997, Markov Chains