AIMAC: An Auction-Inspired MAC Protocol

Size: px
Start display at page:

Download "AIMAC: An Auction-Inspired MAC Protocol"

Transcription

1 AIMAC: An Auction-Inspired MAC Protocol Ian Tan 1 I. INTRODUCTION Much attention has been given over the past decade to examining the properties of ad-hoc wireless networks. Current trends, however, show that the proliferation of access point (AP) based wireless networks continues to grow, and impending deployments of large-scale AP-based networks in metropolitan areas (see [?] and [?]) speak volumes for their popularity. Given the continued spread of AP-based WiFi networks, it would be foolish to ignore the role an AP can play in enforcing MAC protocol adherence. As WiFi reaches wider and wider audiences, the potential for protocol-level misbehavior grows tremendously. Fortunately, AP-based and distributed solutions have been proposed to detect MAC-layer misbehavior. In the following sections, we first briefly review previous work in MAC misbehavior. In light of this work, we next reconsider the role of the AP within the network. After recasting the AP as an auctioneer of channel resources, we propose an Auction-Inspired MAC protocol (AIMAC) that implicitly discourages greedy nodes from continually occupying the wireless channel (i.e. from misbehaving). Additionally, preliminary simulation results are given. II. MISBEHAVIOR METHODS Raya et. al. in [?] provide a general listing of cheating methods that are feasible in Assuming that a wireless node is not malicious (i.e. it misbehaves to gain bandwidth, not solely to deny others access), nearly all misbehavior centers around seizing the channel before other nodes. As such, some methods of cheating are: Scrambling other users frames: Provided the network is in a single collision domain, a misbehaving node can sense the transmissions of other users. By jamming them, he increases the amount of time they back off, thereby leaving him with additional opportunities to occupy the channel. Disregarding interframe spacing parameters: A node could transmit earlier than DIFS, thereby locking out other nodes from the channel. NAV manipulation: By setting a NAV interval much longer than necessary for a given transmission, a cheater can silence nodes around it. Backoff manipulation: A cheater can shorten the size of the distribution out of which it chooses its backoff interval, or it can choose not to backoff at all. Out of these four methods, the last one is the easiest to implement, the least likely to break the protocol, and also the most difficult to detect. It is mainly with this cheating method that the following three works concern themselves. III. BACKOFF DICTATION Within [?], Kyasanur and Vaidya propose a scheme to stem backoff manipulation in an ad-hoc environment. Instead of a sender randomly choosing his own backoff, the receiver specifies a backoff for the sender to use. The receiver then monitors the sender to ensure that the backoff is followed. If the backoff is deviated from, then the receiver retaliates by assigning a penalizing backoff to the sender that is proportional to the extent of the misbehavior. A timing diagram of a sender-receiver data exchange is in Figure 1. Fig. 1. Timing diagram for the backoff dictation scheme. Intially, the sender chooses a random backoff interval, but all subsequent backoffs are governed and monitored by the receiver. The scheme coexists nicely with non-cheaters and is decentralized, but it is still vulnerable to sender-receiver collusion and adaptive misbehavior. It served, however, as the inspiration of the next work.

2 2 IV. BACKOFF DETECTION Drawing off of [?], Raya et. al. propose a battery of AP-based tests to detect cheaters in [?]. Individual tests are constructed to detect all of the cheating misbehaviors listed in Section II. For example, intentional scrambling is detected by determining if any single node consistently has less retransmissions than the average; if so, it is probably cheating. Other tests measure node backoffs and threshold them against averages for detection. The main advantages of [?] are that all changes are centralized at the AP and that the MAC layer on clients need not be modified. Furthermore, the system relies on passive measurements; over the short term, a node cannot determine whether the AP has the system installed. On the other hand, the system is still vulnerable to adaptive cheaters, and, more importantly, it does not give much insight as to how to fundamentally fix the shortcomings in WiFi that permit misbehavior. V. GAME THEORETIC APPROACH One method to fix the shortcomings in (and CSMA protocols in general) is to take a game theoretic approach, such as that in [?]. Cagalj begins by observing that, if channel access is treated as a one-shot game, the situation degrades into the Tragedy of the Commons; namely, either one node obtains all the bandwidth (by seizing the channel first), or no nodes obtain any bandwidth due to repeated collisions. These two outcomes characterize the possible Nash equilibria (NE) of the static game. He then analyzes the channel seizure process as a dynamic game. By exploiting the static game NE as a credible threat, he constructs a distributed protocol that encourages rational nodes to adjust their backoffs. Through these adjustments, nodes come to operate at a more beneficial Nash bargaining equilibrium. The scheme has merit based on its distributed implementation and high throughput for rational (i.e. cheating) nodes. However, its one significant downfall is its great unfairness to non-cheating nodes, as they attain significantly lower throughput than cheaters (between 5x and 10x less). A. Design Observations and Assumptions VI. AIMAC As reviewed in the previous three sections, various methods have been proposed to prevent the easiest form of cheating - backoff manipulation. [?] attempts to specify backoff explicitly between sender and receiver, [?] makes use of an AP as a detection mechanism, and [?] has nodes enforce cooperation in a distributed manner. However, none capitalize fully upon the observation that the wireless medium is a shared resource that can be allocated by a centralized authority such as an AP. At a fundamental level, the AP acts as a aggregator of data. To communicate with any other node inside or outside the wireless network, a sending node s traffic must pass through the AP. Usually, it has no more right to access the shared wireless medium than any other user node. Given the central role it plays, though, one can easily imagine the AP as a scheduler or controller for the wireless channel. If cast in this manner, the AP acts much like an auctioneer. The goods he auctions off are channel access slots, and the people he sells slots to are nodes. The more a node values a slot or slots, the more likely he is to outbid other users for the purchase of those slots. The question, then, becomes: How do we quantify the value of a slot to a node? Obviously, if nodes are to bid on slots, they must be willing to exchange something of value in return. To determine what constitutes an item of value, we make a second observation - that rewards nodes that have smaller backoffs with sustained channel access. In most analyses, increased probability of channel access directly translates into higher throughput. Backoff therefore appears to be a candidate for this valuable item. Of course, in general most traffic patterns would benefit from higher throughput with lower delay. However, having a node obtain more throughput than it reasonably requires is not fair to other users and is essentially cheating. With this in mind, we force a node to tradeoff the quantities of delay and data it demands. Together, these two elements constitute a traffic pattern, as will be explained in the following sections. By forcing nodes to balance the amount of data they wish to send with the delay (backoff) they are willing to suffer, we fundamentally change the direct relationship between backoff and throughput typically assumed in CSMA MAC protocols. In formulating the AIMAC, we wish to ensure the following hold true: 1) Nodes should be forced to balance the data they need to transmit with the backoff (delay) they are willing to suffer 2) Nodes with a higher utility (to be specified) should be guaranteed better performance than nodes with utilities lower than them. 3) Incentive-compatability: Nodes should be encouraged to reveal their minimum requirements for their desired traffic pattern. 4) Misbehaving nodes should never be treated better than obedient nodes. With these criteria, we wish to reward nodes that reveal their minimum traffic requirements by issuing some sort of guarantee on their performance. In our formulation, we assume a trusted AP serving untrustworthy nodes. Bids are always sealed, as some form of encryption is enabled between each node and the AP. However, it is possible for nodes to sense the channel and empirically deduce the winner of past auctions.

3 3 B. Bids and Utilities We begin by defining a standard format for nodes to specify their desired traffic pattern. Based on information from higher layers, the MAC layer for node i submits a bid to the AP in the form (b i, δ i ). b i is the backoff volunteered between data transmissions and δ i is the data burst size following each backoff. The relation between these two quantities is illustrated in Figure??. Both quantities are measured in terms of slots. Fig. 2. The diagram illustrates the traffic pattern formed by a bid of (7, 6). To account for both downlink and uplink traffic, a bidding node should estimate the data requirements of its downlink traffic and merge that with its uplink traffic requirements. Next, a utility function must be defined on the bid so that the AP can rank nodes. In light of objectives (1) and (3), the ultimate goal is to have nodes backoff as long as possible before transmitting as little data as possible. Therefore, define the utility function as: U(b i, δ i ) = b i δ i (1) Notice that higher utility values correspond to either greater backoffs or smaller data bursts. Based on the utility it calculates for each node s bid, the AP ranks nodes from highest utility to lowest. The node with the highest utility is said to win the auction, and is guaranteed the traffic pattern it bid or better. A better traffic pattern is one with higher throughput than the one originally bid. C. Overview AIMAC consists of three primary stages. The first is a solicitation period by the AP. In this stage, the AP gathers new bids from newly entered and existing nodes and ranks them according to their calculated utilities. Next, the AP enters a scheduling mode that assigns data transmission slots to each node, starting with the node with highest utility (the auction winner ). This will be detailed in the following section. Finally, all the nodes accept and run their schedules during the activation stage, the length of which is determined by the AP and/or network administrator. Once the activation stage is complete, bid solicitation begins once again and the access algorithm repeats. D. Scheduling To ensure that a winning node attains at least the traffic pattern he bids, the auction winner is scheduled first. Assuming a first-price auction, the winner receives his desired traffic pattern during the following activation stage. He is assigned a pattern of data transmission slots interleaved with backoff slots where he should not transmit. These backoff slots are left open for the scheduling of other nodes. The data slots may be used for either uplink or downlink traffic as the node dynamically desires. If a data slot is scheduled for node n, say that it is occupied by node n. The AP then schedules other nodes in descending order of their utilities. The scheduling proceeds in a similar manner to that of the winner, with one caveat. The AP cannot schedule new data slots into those that are already occupied. Since scheduling proceeds in descending utility order, higher-ranked nodes maintain their slot occupations in case of scheduling conflicts with lower-ranked nodes. Therefore, the lower a node s rank, the less likely it is to attain its desired traffic pattern. After all nodes are scheduled or all slots in the given activation stage are filled, the AP sends each node their schedule. The activation stage then commences, with the winner having channel occupancy first. Pseudocode for the scheduling algorithm is shown in Algorithm??. E. Bid Solicitation Along with a schedule, the AP also tells nodes in what order they can bid during the subsequent solicitation stage. No node knows the complete ordering of bids - they only know what position they are in the sequence. The order should be randomized to reduce the probability that one node could intentionally disrupt the bid of another node. If a node knew when other nodes were placing their bids, he could strategically disrupt the bids of nodes that had historically outbid him. This would increase his chances of winning the auction unfairly.

4 4 Algorithm 1 Scheduling Algorithm 1: procedure SCHEDULE(B) B is the set of all bids 2: U U will be the set of corresponding utilities 3: for all B i B do 4: U i u(b i, δ i ) 5: U U {U i } where B i is a bid (b i, δ i ) 6: end for 7: while U = 0 do 8: currentslot 1 9: k = arg k max U k U 10: while currentslot < activationstagelength do 11: top lace δ k Extract δ k and b k from bid leading to utility U k 12: backoff b k 13: while top lace > 0 do 14: if currentslot is unoccupied then 15: Place one data slot for node k 16: top lace T op lace 1 17: end if 18: currentslot currentslot : end while 20: currentslot currentslot+ backoff 21: end while 22: U = U \ {U k } 23: end while 24: end procedure F. Incentive Compatibility A precise formulation of the incentive compatibility of this scheme is difficult to show, mainly because the utility a node derives from the schedule returned to it is unknown. The utility function presented previously in Section?? acts more as a ranking function for the AP, and does not represent true nodal utility quite as well. This is because, all other things being equal, most nodes desire higher throughput, which corresponds to lower values of b and higher values of δ. Intuitively, then, we still wish to justify that a node has incentive to reveal its lowest tolerable traffic pattern. This is the pattern with the least amount of data to send and the most amount of time between transmissions. Assume a second-price structure, such that the auction winner actually obtains the traffic pattern of the 2nd place bidder (which presumably has higher throughput than his own bid). ( ) Let (b i, δ i ) be the original bid of a node with associated utility U i. Say that, instead of this bid, he bids b i, δ i, where b i < b i and/or δ i > δ i. In either case, the AP calculates a utility U i that is less than the original bid. Thus, by being greedy, this node has decreased his chances of obtaining a favorable traffic pattern because his rank will drop. Consequently, he will be scheduled later and have fewer data slots available to him. However, by bidding his minimum tolerable traffic pattern (b i, δ i ), he maximizes the chance he will be ranked higher and scheduled earlier. The second-price mechanism is instrumental in encouraging this behavior because, provided node i s utility is higher than that of j, i has no reason to bid anything other than his minimum traffic pattern. If i tries to be greedy (and thus lower his U i ), but manages to still maintain U i > U j, the second-price mechanism will still allocate him the traffic pattern specified by j s bid. For i, this is the best traffic pattern he can obtain without losing to j. Therefore, i wishes to maintain U i as high as possible. G. Simulations In the following simulations, a 30 node network is represented. All thirty nodes choose their b i values from a discrete U[1, 25] distribution and their δ i values from another independent U[1, 25] distribution. The length of the activation stage varies from 50 to 2000 slots between plots. We simulate AIMAC under a first-price auction model, so that winners receive exactly the traffic pattern they bid for. The quantity of interest here is the fractional gain, which we define as: fracgain i = T attained,i T desired,i T desired,i (2) T attained and T desired are the throughputs a node achieves and desires, respectively. T desired is calculated directly from the bid submitted to the AP:

5 5 T desired,i = δ i δ i + b i (3) The simulation results are shown in Figures?? through??. For each network size (x-axis value), the simulation is run 800 times and the average fractional gain for the winner, 2 nd place, 3 rd place, etc. are plotted. Each run simulates a single activation stage with randomly generated traffic patterns. Note that the simulations do not care nor show which nodes specifically win or lose. It is only concerned about the average fractional gain is if, say, we examine the i th place node in a n node network. Also note that this gain is almost always negative, indicating a loss in performance. Under the first-price scheme, no node should ordinarily attain above a 0 fractional gain in the long term. However, since our activation interval is not necessarily an integer multiple of any δ i + b i, effects such as those illustrated in Figure?? could occur, leading to a positive fractional gain. Fig. 3. Illustrates possible overestimation of throughput for a big of (4,2). Long-term throughput is 1 5, but estimate throughput here is 3 13 > 1 3. Certainly, the winner should not suffer any loss or gain compared to its bid. Generally, this holds true, except when the length of the activation stage is on the order of the distribution from which b i s and δ i s are taken. In this case (Figure??), the effects noted in the previous paragraph occur for both the winner, 2 nd, and 3 rd place bidders. In reading the plots, the uppermost line (colored blue) indicates the gains of the auction winner. Working downwards leads to the gains of the 2 nd place (green), 3 rd place (red), etc. nodes. One apparent property is that as network size grows, only a limited number of nodes can be supported with non-zero throughput. For even a modest network size of 30, if all nodes are in contention, only 7 nodes can be supported with less than 80% loss. However, this bears further examination since a smaller network size appears to support even fewer nodes adequately (about 5 for a 10 node network). The growth in supportable nodes with network size may be due to the increased likelihood of less intensive traffic patterns being demanded of the AP. It also appears that the length of the activation period does not affect the loss suffered by the losing node. For example, in a 2 node network, the 2 nd place node always appears to lose about 27% of its desired throughput, regardless of the activation period. A similar observation holds for the 3 rd place node - he seems to lose about 60-65% of his target performance in a 3 node network. Fig. 4. Fractional gains as a function of network size for various bidders. The winning node is represented by the top curve, and rank decreases going downwards. Activation period is 50 slots. VII. CONCLUSION Ensuring that wireless users obey MAC protocol rules is a valid concern, especially considering the overwhelming popularity of IEEE Several approaches, focusing on detecting and correcting backoff-based misbehavior, have been briefly

6 6 Fig. 5. Fractional gains as a function of network size for various bidders. Activation period of 500 slots. Fig. 6. Fractional gains as a function of network size for various bidders. Activation period of 2000 slots. reviewed. Based on these approaches and a rethinking of the role of the AP in an infrastructure network, we propose an auction-inspired MAC protocol. By casting the AP as an auctioneer of channel resources, we avoid the tendency to link channel seizure with increased bandwidth. Instead, we force nodes to trade off between the amount of data they send and how long they wait to send it. Sparse data patterns are encouraged, while greedy ones are discouraged, thereby giving nodes an incentive to bid their minimum tolerable traffic pattern. In the immediate future, we hope to continue simulating the scheme with more realistic traffic patterns and/or the secondprice auction methodology. Also, the fact that the auction is repeated may impact the bidding strategies nodes use. From a conceptual standpoint, AIMAC is a first step towards exploring the potential in auction-based MAC mechanisms. Future work in this vein will examine how such schemes should be constructed, and what tradeoffs nodes should be forced to make in order to ensure system-wide fairness. REFERENCES [1] M. Cagalj, S. Ganeriwal, I. Aad and J.-P. Hubaux, On Selfish Behavior in CSMA/CA Networks. IEEE Infocom 05, March 2005.

7 [2] P. Kyasanur and N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks. Dependable Systems and Networks, June [3] D. McCullagh, EarthLink wins Philly Wi-Fi contract. 4 October html [4] E. Mills, Google in San Francisco: Wireless Overlord?. 1 October html [5] M. Raya, J.-P. Hubaux, and I. Aad, DOMINO: A system to detect greedy behavior in IEEE hotspots. ACM MobiSys, June

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior Announcements I'd like to talk with each project team in the next week to get a quick progress update

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC

More information

Resource sharing optimality in WiFi infrastructure networks

Resource sharing optimality in WiFi infrastructure networks Resource sharing optimality in WiFi infrastructure networks Ilenia Tinnirello 1, Laura Giarré 1, Giovanni Neglia 2 1 Università di Palermo, Italy, 2 INRIA, France (giarre@unipa.it) November 2009 MIT 1

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks 1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation

More information

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited Security Issues 476 Caveat Much of security-related stuff is mostly beyond my expertise So coverage of this topic is very limited 477 Security Issues in Mobile Ad Hoc Networks Not much work in this area

More information

Mohammad Hossein Manshaei

Mohammad Hossein Manshaei Mohammad Hossein Manshaei manshaei@gmail.com Chapter 9: (secowinet.epfl.ch) operating principles of IEEE 802.11, detecting selfish behavior in hot spots, and selfish behavior in pure ad hoc networks 2

More information

Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE WLAN

Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE WLAN Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN Kyung-Joon Park 1, Jihyuk Choi 2, Kyungtae Kang 1, and Yih-Chun Hu 2 1 Department of Computer Science, University of Illinois

More information

Incentive for P2P Fair Resource Sharing

Incentive for P2P Fair Resource Sharing Incentive for P2P Fair Resource Sharing Emmanuelle Anceaume CNRS IRISA, France Joint work with Maria Gradinariu (IRISA), Aina Ravoaja (IRISA) Facing Rationality Classical distributed systems P2P Either

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 5

CPSC 536N: Randomized Algorithms Term 2. Lecture 5 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 5 University of British Columbia In this lecture we continue to discuss applications of randomized algorithms in computer networking.

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS

ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS 1 Cristina Comaniciu Stevens Institute of Technology A DIFFERENT PERSPECTIVE ON SECURITY FOR WIRELESS Security is a key requirement

More information

A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF

A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. A Robust Kolmogorov-Smirnov Detector for Misbehavior

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

A Study of Jamming Attacks in IEEE Networks. Deepak Nadig Anantha

A Study of Jamming Attacks in IEEE Networks. Deepak Nadig Anantha A Study of Jamming Attacks in IEEE 802.11 Networks Deepak Nadig Anantha Monday 1 st December, 2008 Contents 1 Introduction 1 1.1 Introduction.............................. 1 1.2 MAC Layer functionality

More information

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks

Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Computer Technology and Application 6 (2015) 37-44 doi: 10.17265/1934-7332/2015.01.006 D DAVID PUBLISHING Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Mohammed-Alamine

More information

Detection and Handling of MAC Layer Misbehavior in Wireless Networks

Detection and Handling of MAC Layer Misbehavior in Wireless Networks Detection and Handling of MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at Urbana-Champaign email: kyasanur@uiuc.edu

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations

Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations Jerzy Konorski Technical University of Gdansk ul. Narutowicza 11/12, 80-952 Gdansk, Poland jekon@pg.gda.pl Abstract. A class of contention-type

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

SALSA: Super-Peer Assisted Live Streaming Architecture

SALSA: Super-Peer Assisted Live Streaming Architecture SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Vertical Handover Decision Strategies A double-sided auction approach

Vertical Handover Decision Strategies A double-sided auction approach Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous

More information

MOST COMMUNICATION protocols were designed

MOST COMMUNICATION protocols were designed IEEE/ACM TRANSACTIONS ON NETWORKING 1 Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments Alvaro A Cárdenas, Member, IEEE, Svetlana Radosavac, Member, IEEE, and John S

More information

Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras

Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras TECHNICAL RESEARCH REPORT Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras SEIL TR 2004-4 (ISR TR 2004-30) I R INSTITUTE FOR

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Impersonation-Based Mechanisms

Impersonation-Based Mechanisms Impersonation-Based Mechanisms Moshe Babaioff, Ron Lavi, and Elan Pavlov Abstract In this paper we present a general scheme to create mechanisms that approximate the social welfare in the presence of selfish

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

End-to-end QoS negotiation in network federations

End-to-end QoS negotiation in network federations End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

Detecting IEEE MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers

Detecting IEEE MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers Journal of Computer Security 15 (2007) 103 128 103 IOS Press Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers S. Radosavac a,,alvaroa.cárdenas

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks

An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks Z. James Ji, Wei (Anthony) Yu, and K. J. Ray Liu Electrical and Computer Engineering Department and Institute for Systems Research

More information

Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach

Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Chapter 23 Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Josephina Antoniou, Vicky Papadopoulou, Vasos Vassiliou, and Andreas Pitsillides Contents 23.1 Introduction... 536

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

936 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE In the GSM network, the control channels of the TDM channels use slotted-

936 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE In the GSM network, the control channels of the TDM channels use slotted- 936 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 3, JUNE 2009 An Analysis of Generalized Slotted-Aloha Protocols Richard T B Ma, Student Member, IEEE, Vishal Misra, Member, IEEE, and Dan Rubenstein,

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

ADENSE wireless network is defined to be a wireless network

ADENSE wireless network is defined to be a wireless network 1094 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 16, NO 5, OCTOBER 2008 The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes Hazer Inaltekin,

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Distributed Computing Building Blocks for Rational Agents

Distributed Computing Building Blocks for Rational Agents Distributed Computing Building Blocks for Rational Agents Yehuda Afek, Yehonatan Ginzberg, Shir Landau Feibish, and Moshe Sulamy Blavatnik School of Computer Science, Tel-Aviv University, Israel afek@cs.tau.ac.il,

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

IEEE Proof Print Version

IEEE Proof Print Version IEEE/ACM TRANSACTIONS ON NETWORKING 1 Random Access Game and Medium Access Control Design Lijun Chen, Member, IEEE, Steven H. Low, Fellow, IEEE, and John C. Doyle Abstract Motivated partially by a control-theoretic

More information

A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY

A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY Tao Jin * Chunxiao Chigan ** College of Computer and Information Science and Department of Electrical and Computer Engineering

More information

Game Theory and Learning at the Medium Access Control Layer for Distributed Radio Resource Sharing in Random Access Wireless Networks

Game Theory and Learning at the Medium Access Control Layer for Distributed Radio Resource Sharing in Random Access Wireless Networks Game Theory and Learning at the Medium Access Control Layer for Distributed Radio Resource Sharing in Random Access Wireless Networks Eric Ayienga 1, Elisha Opiyo 1, Bernard Manderick 2 and Okelo Odongo

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

1124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST Robust Detection of Selfish Misbehavior in Wireless Networks

1124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST Robust Detection of Selfish Misbehavior in Wireless Networks 1124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST 27 Robust Detection of Selfish Misbehavior in Wireless Networks Alberto Lopez Toledo, Student Member, IEEE, and Xiaodong Wang,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore

High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore Module No # 09 Lecture No # 40 This is lecture forty of the course on

More information

Arjuna Technologies Ltd is a world leading innovator in distributed computing and has an international reputation for delivering missioncritical products to global software vendors. Products developed

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Design of an Enhanced Access Point to Optimize TCP Performance in Wi-Fi Hotspot Networks

Design of an Enhanced Access Point to Optimize TCP Performance in Wi-Fi Hotspot Networks Design of an Enhanced Access Point to Optimize TCP Performance in Wi-Fi Hotspot Networks Raffaele Bruno, Marco Conti, Enrico Gregori Institute of Informatics and Telematics (IIT) Italian National Research

More information

Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots

Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots Raffaele Bruno 1, Marco Conti 1, and Enrico Gregori 1 Italian National Research Council (CNR) - IIT Institute, Via G. Moruzzi 1,

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

Impact of Misbehaviour on QoS in Wireless Mesh Networks

Impact of Misbehaviour on QoS in Wireless Mesh Networks 1 Impact of Misbehaviour on QoS in Wireless Mesh Networks Szymon Szott 1, Marek Natkaniec 1, and Albert Banchs 2 1 AGH University of Science and Technology, Krakow, Poland {szott,natkanie}@kt.agh.edu.pl

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks

Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks Wei Wang, Xiaobing Wu, Lei Xie and Sanglu Lu Nanjing University April 28, 2015 1/1 Heterogeneous Cellular Networks femto-cell

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing

Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing Naveen Shastry and Raviraj S. Adve Department of Electrical and Computer Engineering, University of Toronto 0 King s College

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University

More information

Design Space Analysis for Modeling Incentives in Distributed Systems

Design Space Analysis for Modeling Incentives in Distributed Systems Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed

More information

A Survey of Recent Results on Real-Time Wireless Networking

A Survey of Recent Results on Real-Time Wireless Networking A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 Important notes about this examination 1. You have 40 minutes to complete this exam. 2. No electronic aides (e.g., phones or

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Handover Incentives: Revised Model with Extensions for Uplink Traffic

Handover Incentives: Revised Model with Extensions for Uplink Traffic Handover Incentives: Revised Model with Extensions for Uplink Traffic Xenofon Fafoutis 1 and Vasilios A. Siris 1, 2 1 Institute of Computer Science, Foundation for Research and Technology Hellas Heraklion,

More information

Prices and Auctions in Markets with Complex Constraints

Prices and Auctions in Markets with Complex Constraints Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

A Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks

A Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks A Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks Zhu Han, Charles Pandana, and K.J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Detection, penalization and handling of misbehavior in ad hoc wireless networks

Detection, penalization and handling of misbehavior in ad hoc wireless networks IAENG International Journal of Computer Science, 33:1, IJCS_33_1_3 Detection, penalization and handling of misbehavior in ad hoc wireless networks Revoti Prasad Bora, Dheeraj Harihar and Saurabh Sehrawat

More information

Attackers. Abstract. probabilistic distributed MAC protocol, we focus our analysis on the IEEE MAC. Keywords

Attackers. Abstract. probabilistic distributed MAC protocol, we focus our analysis on the IEEE MAC. Keywords Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies Against Individual and Colluding Attackers Svetlana Radosavac University of Maryland, College Park John S. Baras University

More information