AIMAC: An Auction-Inspired MAC Protocol
|
|
- Clifton Charles
- 5 years ago
- Views:
Transcription
1 AIMAC: An Auction-Inspired MAC Protocol Ian Tan 1 I. INTRODUCTION Much attention has been given over the past decade to examining the properties of ad-hoc wireless networks. Current trends, however, show that the proliferation of access point (AP) based wireless networks continues to grow, and impending deployments of large-scale AP-based networks in metropolitan areas (see [?] and [?]) speak volumes for their popularity. Given the continued spread of AP-based WiFi networks, it would be foolish to ignore the role an AP can play in enforcing MAC protocol adherence. As WiFi reaches wider and wider audiences, the potential for protocol-level misbehavior grows tremendously. Fortunately, AP-based and distributed solutions have been proposed to detect MAC-layer misbehavior. In the following sections, we first briefly review previous work in MAC misbehavior. In light of this work, we next reconsider the role of the AP within the network. After recasting the AP as an auctioneer of channel resources, we propose an Auction-Inspired MAC protocol (AIMAC) that implicitly discourages greedy nodes from continually occupying the wireless channel (i.e. from misbehaving). Additionally, preliminary simulation results are given. II. MISBEHAVIOR METHODS Raya et. al. in [?] provide a general listing of cheating methods that are feasible in Assuming that a wireless node is not malicious (i.e. it misbehaves to gain bandwidth, not solely to deny others access), nearly all misbehavior centers around seizing the channel before other nodes. As such, some methods of cheating are: Scrambling other users frames: Provided the network is in a single collision domain, a misbehaving node can sense the transmissions of other users. By jamming them, he increases the amount of time they back off, thereby leaving him with additional opportunities to occupy the channel. Disregarding interframe spacing parameters: A node could transmit earlier than DIFS, thereby locking out other nodes from the channel. NAV manipulation: By setting a NAV interval much longer than necessary for a given transmission, a cheater can silence nodes around it. Backoff manipulation: A cheater can shorten the size of the distribution out of which it chooses its backoff interval, or it can choose not to backoff at all. Out of these four methods, the last one is the easiest to implement, the least likely to break the protocol, and also the most difficult to detect. It is mainly with this cheating method that the following three works concern themselves. III. BACKOFF DICTATION Within [?], Kyasanur and Vaidya propose a scheme to stem backoff manipulation in an ad-hoc environment. Instead of a sender randomly choosing his own backoff, the receiver specifies a backoff for the sender to use. The receiver then monitors the sender to ensure that the backoff is followed. If the backoff is deviated from, then the receiver retaliates by assigning a penalizing backoff to the sender that is proportional to the extent of the misbehavior. A timing diagram of a sender-receiver data exchange is in Figure 1. Fig. 1. Timing diagram for the backoff dictation scheme. Intially, the sender chooses a random backoff interval, but all subsequent backoffs are governed and monitored by the receiver. The scheme coexists nicely with non-cheaters and is decentralized, but it is still vulnerable to sender-receiver collusion and adaptive misbehavior. It served, however, as the inspiration of the next work.
2 2 IV. BACKOFF DETECTION Drawing off of [?], Raya et. al. propose a battery of AP-based tests to detect cheaters in [?]. Individual tests are constructed to detect all of the cheating misbehaviors listed in Section II. For example, intentional scrambling is detected by determining if any single node consistently has less retransmissions than the average; if so, it is probably cheating. Other tests measure node backoffs and threshold them against averages for detection. The main advantages of [?] are that all changes are centralized at the AP and that the MAC layer on clients need not be modified. Furthermore, the system relies on passive measurements; over the short term, a node cannot determine whether the AP has the system installed. On the other hand, the system is still vulnerable to adaptive cheaters, and, more importantly, it does not give much insight as to how to fundamentally fix the shortcomings in WiFi that permit misbehavior. V. GAME THEORETIC APPROACH One method to fix the shortcomings in (and CSMA protocols in general) is to take a game theoretic approach, such as that in [?]. Cagalj begins by observing that, if channel access is treated as a one-shot game, the situation degrades into the Tragedy of the Commons; namely, either one node obtains all the bandwidth (by seizing the channel first), or no nodes obtain any bandwidth due to repeated collisions. These two outcomes characterize the possible Nash equilibria (NE) of the static game. He then analyzes the channel seizure process as a dynamic game. By exploiting the static game NE as a credible threat, he constructs a distributed protocol that encourages rational nodes to adjust their backoffs. Through these adjustments, nodes come to operate at a more beneficial Nash bargaining equilibrium. The scheme has merit based on its distributed implementation and high throughput for rational (i.e. cheating) nodes. However, its one significant downfall is its great unfairness to non-cheating nodes, as they attain significantly lower throughput than cheaters (between 5x and 10x less). A. Design Observations and Assumptions VI. AIMAC As reviewed in the previous three sections, various methods have been proposed to prevent the easiest form of cheating - backoff manipulation. [?] attempts to specify backoff explicitly between sender and receiver, [?] makes use of an AP as a detection mechanism, and [?] has nodes enforce cooperation in a distributed manner. However, none capitalize fully upon the observation that the wireless medium is a shared resource that can be allocated by a centralized authority such as an AP. At a fundamental level, the AP acts as a aggregator of data. To communicate with any other node inside or outside the wireless network, a sending node s traffic must pass through the AP. Usually, it has no more right to access the shared wireless medium than any other user node. Given the central role it plays, though, one can easily imagine the AP as a scheduler or controller for the wireless channel. If cast in this manner, the AP acts much like an auctioneer. The goods he auctions off are channel access slots, and the people he sells slots to are nodes. The more a node values a slot or slots, the more likely he is to outbid other users for the purchase of those slots. The question, then, becomes: How do we quantify the value of a slot to a node? Obviously, if nodes are to bid on slots, they must be willing to exchange something of value in return. To determine what constitutes an item of value, we make a second observation - that rewards nodes that have smaller backoffs with sustained channel access. In most analyses, increased probability of channel access directly translates into higher throughput. Backoff therefore appears to be a candidate for this valuable item. Of course, in general most traffic patterns would benefit from higher throughput with lower delay. However, having a node obtain more throughput than it reasonably requires is not fair to other users and is essentially cheating. With this in mind, we force a node to tradeoff the quantities of delay and data it demands. Together, these two elements constitute a traffic pattern, as will be explained in the following sections. By forcing nodes to balance the amount of data they wish to send with the delay (backoff) they are willing to suffer, we fundamentally change the direct relationship between backoff and throughput typically assumed in CSMA MAC protocols. In formulating the AIMAC, we wish to ensure the following hold true: 1) Nodes should be forced to balance the data they need to transmit with the backoff (delay) they are willing to suffer 2) Nodes with a higher utility (to be specified) should be guaranteed better performance than nodes with utilities lower than them. 3) Incentive-compatability: Nodes should be encouraged to reveal their minimum requirements for their desired traffic pattern. 4) Misbehaving nodes should never be treated better than obedient nodes. With these criteria, we wish to reward nodes that reveal their minimum traffic requirements by issuing some sort of guarantee on their performance. In our formulation, we assume a trusted AP serving untrustworthy nodes. Bids are always sealed, as some form of encryption is enabled between each node and the AP. However, it is possible for nodes to sense the channel and empirically deduce the winner of past auctions.
3 3 B. Bids and Utilities We begin by defining a standard format for nodes to specify their desired traffic pattern. Based on information from higher layers, the MAC layer for node i submits a bid to the AP in the form (b i, δ i ). b i is the backoff volunteered between data transmissions and δ i is the data burst size following each backoff. The relation between these two quantities is illustrated in Figure??. Both quantities are measured in terms of slots. Fig. 2. The diagram illustrates the traffic pattern formed by a bid of (7, 6). To account for both downlink and uplink traffic, a bidding node should estimate the data requirements of its downlink traffic and merge that with its uplink traffic requirements. Next, a utility function must be defined on the bid so that the AP can rank nodes. In light of objectives (1) and (3), the ultimate goal is to have nodes backoff as long as possible before transmitting as little data as possible. Therefore, define the utility function as: U(b i, δ i ) = b i δ i (1) Notice that higher utility values correspond to either greater backoffs or smaller data bursts. Based on the utility it calculates for each node s bid, the AP ranks nodes from highest utility to lowest. The node with the highest utility is said to win the auction, and is guaranteed the traffic pattern it bid or better. A better traffic pattern is one with higher throughput than the one originally bid. C. Overview AIMAC consists of three primary stages. The first is a solicitation period by the AP. In this stage, the AP gathers new bids from newly entered and existing nodes and ranks them according to their calculated utilities. Next, the AP enters a scheduling mode that assigns data transmission slots to each node, starting with the node with highest utility (the auction winner ). This will be detailed in the following section. Finally, all the nodes accept and run their schedules during the activation stage, the length of which is determined by the AP and/or network administrator. Once the activation stage is complete, bid solicitation begins once again and the access algorithm repeats. D. Scheduling To ensure that a winning node attains at least the traffic pattern he bids, the auction winner is scheduled first. Assuming a first-price auction, the winner receives his desired traffic pattern during the following activation stage. He is assigned a pattern of data transmission slots interleaved with backoff slots where he should not transmit. These backoff slots are left open for the scheduling of other nodes. The data slots may be used for either uplink or downlink traffic as the node dynamically desires. If a data slot is scheduled for node n, say that it is occupied by node n. The AP then schedules other nodes in descending order of their utilities. The scheduling proceeds in a similar manner to that of the winner, with one caveat. The AP cannot schedule new data slots into those that are already occupied. Since scheduling proceeds in descending utility order, higher-ranked nodes maintain their slot occupations in case of scheduling conflicts with lower-ranked nodes. Therefore, the lower a node s rank, the less likely it is to attain its desired traffic pattern. After all nodes are scheduled or all slots in the given activation stage are filled, the AP sends each node their schedule. The activation stage then commences, with the winner having channel occupancy first. Pseudocode for the scheduling algorithm is shown in Algorithm??. E. Bid Solicitation Along with a schedule, the AP also tells nodes in what order they can bid during the subsequent solicitation stage. No node knows the complete ordering of bids - they only know what position they are in the sequence. The order should be randomized to reduce the probability that one node could intentionally disrupt the bid of another node. If a node knew when other nodes were placing their bids, he could strategically disrupt the bids of nodes that had historically outbid him. This would increase his chances of winning the auction unfairly.
4 4 Algorithm 1 Scheduling Algorithm 1: procedure SCHEDULE(B) B is the set of all bids 2: U U will be the set of corresponding utilities 3: for all B i B do 4: U i u(b i, δ i ) 5: U U {U i } where B i is a bid (b i, δ i ) 6: end for 7: while U = 0 do 8: currentslot 1 9: k = arg k max U k U 10: while currentslot < activationstagelength do 11: top lace δ k Extract δ k and b k from bid leading to utility U k 12: backoff b k 13: while top lace > 0 do 14: if currentslot is unoccupied then 15: Place one data slot for node k 16: top lace T op lace 1 17: end if 18: currentslot currentslot : end while 20: currentslot currentslot+ backoff 21: end while 22: U = U \ {U k } 23: end while 24: end procedure F. Incentive Compatibility A precise formulation of the incentive compatibility of this scheme is difficult to show, mainly because the utility a node derives from the schedule returned to it is unknown. The utility function presented previously in Section?? acts more as a ranking function for the AP, and does not represent true nodal utility quite as well. This is because, all other things being equal, most nodes desire higher throughput, which corresponds to lower values of b and higher values of δ. Intuitively, then, we still wish to justify that a node has incentive to reveal its lowest tolerable traffic pattern. This is the pattern with the least amount of data to send and the most amount of time between transmissions. Assume a second-price structure, such that the auction winner actually obtains the traffic pattern of the 2nd place bidder (which presumably has higher throughput than his own bid). ( ) Let (b i, δ i ) be the original bid of a node with associated utility U i. Say that, instead of this bid, he bids b i, δ i, where b i < b i and/or δ i > δ i. In either case, the AP calculates a utility U i that is less than the original bid. Thus, by being greedy, this node has decreased his chances of obtaining a favorable traffic pattern because his rank will drop. Consequently, he will be scheduled later and have fewer data slots available to him. However, by bidding his minimum tolerable traffic pattern (b i, δ i ), he maximizes the chance he will be ranked higher and scheduled earlier. The second-price mechanism is instrumental in encouraging this behavior because, provided node i s utility is higher than that of j, i has no reason to bid anything other than his minimum traffic pattern. If i tries to be greedy (and thus lower his U i ), but manages to still maintain U i > U j, the second-price mechanism will still allocate him the traffic pattern specified by j s bid. For i, this is the best traffic pattern he can obtain without losing to j. Therefore, i wishes to maintain U i as high as possible. G. Simulations In the following simulations, a 30 node network is represented. All thirty nodes choose their b i values from a discrete U[1, 25] distribution and their δ i values from another independent U[1, 25] distribution. The length of the activation stage varies from 50 to 2000 slots between plots. We simulate AIMAC under a first-price auction model, so that winners receive exactly the traffic pattern they bid for. The quantity of interest here is the fractional gain, which we define as: fracgain i = T attained,i T desired,i T desired,i (2) T attained and T desired are the throughputs a node achieves and desires, respectively. T desired is calculated directly from the bid submitted to the AP:
5 5 T desired,i = δ i δ i + b i (3) The simulation results are shown in Figures?? through??. For each network size (x-axis value), the simulation is run 800 times and the average fractional gain for the winner, 2 nd place, 3 rd place, etc. are plotted. Each run simulates a single activation stage with randomly generated traffic patterns. Note that the simulations do not care nor show which nodes specifically win or lose. It is only concerned about the average fractional gain is if, say, we examine the i th place node in a n node network. Also note that this gain is almost always negative, indicating a loss in performance. Under the first-price scheme, no node should ordinarily attain above a 0 fractional gain in the long term. However, since our activation interval is not necessarily an integer multiple of any δ i + b i, effects such as those illustrated in Figure?? could occur, leading to a positive fractional gain. Fig. 3. Illustrates possible overestimation of throughput for a big of (4,2). Long-term throughput is 1 5, but estimate throughput here is 3 13 > 1 3. Certainly, the winner should not suffer any loss or gain compared to its bid. Generally, this holds true, except when the length of the activation stage is on the order of the distribution from which b i s and δ i s are taken. In this case (Figure??), the effects noted in the previous paragraph occur for both the winner, 2 nd, and 3 rd place bidders. In reading the plots, the uppermost line (colored blue) indicates the gains of the auction winner. Working downwards leads to the gains of the 2 nd place (green), 3 rd place (red), etc. nodes. One apparent property is that as network size grows, only a limited number of nodes can be supported with non-zero throughput. For even a modest network size of 30, if all nodes are in contention, only 7 nodes can be supported with less than 80% loss. However, this bears further examination since a smaller network size appears to support even fewer nodes adequately (about 5 for a 10 node network). The growth in supportable nodes with network size may be due to the increased likelihood of less intensive traffic patterns being demanded of the AP. It also appears that the length of the activation period does not affect the loss suffered by the losing node. For example, in a 2 node network, the 2 nd place node always appears to lose about 27% of its desired throughput, regardless of the activation period. A similar observation holds for the 3 rd place node - he seems to lose about 60-65% of his target performance in a 3 node network. Fig. 4. Fractional gains as a function of network size for various bidders. The winning node is represented by the top curve, and rank decreases going downwards. Activation period is 50 slots. VII. CONCLUSION Ensuring that wireless users obey MAC protocol rules is a valid concern, especially considering the overwhelming popularity of IEEE Several approaches, focusing on detecting and correcting backoff-based misbehavior, have been briefly
6 6 Fig. 5. Fractional gains as a function of network size for various bidders. Activation period of 500 slots. Fig. 6. Fractional gains as a function of network size for various bidders. Activation period of 2000 slots. reviewed. Based on these approaches and a rethinking of the role of the AP in an infrastructure network, we propose an auction-inspired MAC protocol. By casting the AP as an auctioneer of channel resources, we avoid the tendency to link channel seizure with increased bandwidth. Instead, we force nodes to trade off between the amount of data they send and how long they wait to send it. Sparse data patterns are encouraged, while greedy ones are discouraged, thereby giving nodes an incentive to bid their minimum tolerable traffic pattern. In the immediate future, we hope to continue simulating the scheme with more realistic traffic patterns and/or the secondprice auction methodology. Also, the fact that the auction is repeated may impact the bidding strategies nodes use. From a conceptual standpoint, AIMAC is a first step towards exploring the potential in auction-based MAC mechanisms. Future work in this vein will examine how such schemes should be constructed, and what tradeoffs nodes should be forced to make in order to ensure system-wide fairness. REFERENCES [1] M. Cagalj, S. Ganeriwal, I. Aad and J.-P. Hubaux, On Selfish Behavior in CSMA/CA Networks. IEEE Infocom 05, March 2005.
7 [2] P. Kyasanur and N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks. Dependable Systems and Networks, June [3] D. McCullagh, EarthLink wins Philly Wi-Fi contract. 4 October html [4] E. Mills, Google in San Francisco: Wireless Overlord?. 1 October html [5] M. Raya, J.-P. Hubaux, and I. Aad, DOMINO: A system to detect greedy behavior in IEEE hotspots. ACM MobiSys, June
Wireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior Announcements I'd like to talk with each project team in the next week to get a quick progress update
More informationDOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication
More informationMAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science
MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC
More informationResource sharing optimality in WiFi infrastructure networks
Resource sharing optimality in WiFi infrastructure networks Ilenia Tinnirello 1, Laura Giarré 1, Giovanni Neglia 2 1 Università di Palermo, Italy, 2 INRIA, France (giarre@unipa.it) November 2009 MIT 1
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationSimple Channel-Change Games for Spectrum- Agile Wireless Networks
1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation
More informationCaveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited
Security Issues 476 Caveat Much of security-related stuff is mostly beyond my expertise So coverage of this topic is very limited 477 Security Issues in Mobile Ad Hoc Networks Not much work in this area
More informationMohammad Hossein Manshaei
Mohammad Hossein Manshaei manshaei@gmail.com Chapter 9: (secowinet.epfl.ch) operating principles of IEEE 802.11, detecting selfish behavior in hot spots, and selfish behavior in pure ad hoc networks 2
More informationMalicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE WLAN
Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN Kyung-Joon Park 1, Jihyuk Choi 2, Kyungtae Kang 1, and Yih-Chun Hu 2 1 Department of Computer Science, University of Illinois
More informationIncentive for P2P Fair Resource Sharing
Incentive for P2P Fair Resource Sharing Emmanuelle Anceaume CNRS IRISA, France Joint work with Maria Gradinariu (IRISA), Aina Ravoaja (IRISA) Facing Rationality Classical distributed systems P2P Either
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 5
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 5 University of British Columbia In this lecture we continue to discuss applications of randomized algorithms in computer networking.
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More informationON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS
ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS 1 Cristina Comaniciu Stevens Institute of Technology A DIFFERENT PERSPECTIVE ON SECURITY FOR WIRELESS Security is a key requirement
More informationA Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. A Robust Kolmogorov-Smirnov Detector for Misbehavior
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationA Study of Jamming Attacks in IEEE Networks. Deepak Nadig Anantha
A Study of Jamming Attacks in IEEE 802.11 Networks Deepak Nadig Anantha Monday 1 st December, 2008 Contents 1 Introduction 1 1.1 Introduction.............................. 1 1.2 MAC Layer functionality
More informationPerformance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
Computer Technology and Application 6 (2015) 37-44 doi: 10.17265/1934-7332/2015.01.006 D DAVID PUBLISHING Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Mohammed-Alamine
More informationDetection and Handling of MAC Layer Misbehavior in Wireless Networks
Detection and Handling of MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at Urbana-Champaign email: kyasanur@uiuc.edu
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationMultiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations Jerzy Konorski Technical University of Gdansk ul. Narutowicza 11/12, 80-952 Gdansk, Poland jekon@pg.gda.pl Abstract. A class of contention-type
More informationOn the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract
On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners
More informationPractical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren
Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant
More informationSALSA: Super-Peer Assisted Live Streaming Architecture
SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University
More informationAttacks on WLAN Alessandro Redondi
Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing
More informationDOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication
More informationVertical Handover Decision Strategies A double-sided auction approach
Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous
More informationMOST COMMUNICATION protocols were designed
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments Alvaro A Cárdenas, Member, IEEE, Svetlana Radosavac, Member, IEEE, and John S
More informationDetection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras
TECHNICAL RESEARCH REPORT Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras SEIL TR 2004-4 (ISR TR 2004-30) I R INSTITUTE FOR
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationA Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer
Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationA Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs
A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science
More informationImpersonation-Based Mechanisms
Impersonation-Based Mechanisms Moshe Babaioff, Ron Lavi, and Elan Pavlov Abstract In this paper we present a general scheme to create mechanisms that approximate the social welfare in the presence of selfish
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationEnd-to-end QoS negotiation in network federations
End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation
More informationPriority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,
More informationDetecting IEEE MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
Journal of Computer Security 15 (2007) 103 128 103 IOS Press Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers S. Radosavac a,,alvaroa.cárdenas
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationAn Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks
An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks Z. James Ji, Wei (Anthony) Yu, and K. J. Ray Liu Electrical and Computer Engineering Department and Institute for Systems Research
More informationNetwork Selection and Handoff in Wireless Networks: A Game Theoretic Approach
Chapter 23 Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Josephina Antoniou, Vicky Papadopoulou, Vasos Vassiliou, and Andreas Pitsillides Contents 23.1 Introduction... 536
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More information936 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE In the GSM network, the control channels of the TDM channels use slotted-
936 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 3, JUNE 2009 An Analysis of Generalized Slotted-Aloha Protocols Richard T B Ma, Student Member, IEEE, Vishal Misra, Member, IEEE, and Dan Rubenstein,
More informationProject Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN
Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work
More informationADENSE wireless network is defined to be a wireless network
1094 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 16, NO 5, OCTOBER 2008 The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes Hazer Inaltekin,
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationSpectrum Auction Framework for Access Allocation in Cognitive Radio Networks
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 12-17-2010 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationDistributed Computing Building Blocks for Rational Agents
Distributed Computing Building Blocks for Rational Agents Yehuda Afek, Yehonatan Ginzberg, Shir Landau Feibish, and Moshe Sulamy Blavatnik School of Computer Science, Tel-Aviv University, Israel afek@cs.tau.ac.il,
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationMobile ad hoc networks Various problems and some solutions
Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationIEEE Proof Print Version
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Random Access Game and Medium Access Control Design Lijun Chen, Member, IEEE, Steven H. Low, Fellow, IEEE, and John C. Doyle Abstract Motivated partially by a control-theoretic
More informationA SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY
A SECURITY-ENABLED WIRELESS TOKEN CLUSTER MAC PROTOCOL WITH INTELLIGENT TOKEN POLICY Tao Jin * Chunxiao Chigan ** College of Computer and Information Science and Department of Electrical and Computer Engineering
More informationGame Theory and Learning at the Medium Access Control Layer for Distributed Radio Resource Sharing in Random Access Wireless Networks
Game Theory and Learning at the Medium Access Control Layer for Distributed Radio Resource Sharing in Random Access Wireless Networks Eric Ayienga 1, Elisha Opiyo 1, Bernard Manderick 2 and Okelo Odongo
More informationFinal Exam: Mobile Networking (Part II of the course Réseaux et mobilité )
Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the
More information1124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST Robust Detection of Selfish Misbehavior in Wireless Networks
1124 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST 27 Robust Detection of Selfish Misbehavior in Wireless Networks Alberto Lopez Toledo, Student Member, IEEE, and Xiaodong Wang,
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationHigh Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore
High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore Module No # 09 Lecture No # 40 This is lecture forty of the course on
More informationArjuna Technologies Ltd is a world leading innovator in distributed computing and has an international reputation for delivering missioncritical products to global software vendors. Products developed
More informationPessimistic Backoff for Mobile Ad hoc Networks
Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of
More informationAn Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs
An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,
More informationDesign of an Enhanced Access Point to Optimize TCP Performance in Wi-Fi Hotspot Networks
Design of an Enhanced Access Point to Optimize TCP Performance in Wi-Fi Hotspot Networks Raffaele Bruno, Marco Conti, Enrico Gregori Institute of Informatics and Telematics (IIT) Italian National Research
More informationThroughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots
Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots Raffaele Bruno 1, Marco Conti 1, and Enrico Gregori 1 Italian National Research Council (CNR) - IIT Institute, Via G. Moruzzi 1,
More informationAPPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology
APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively
More informationImpact of Misbehaviour on QoS in Wireless Mesh Networks
1 Impact of Misbehaviour on QoS in Wireless Mesh Networks Szymon Szott 1, Marek Natkaniec 1, and Albert Banchs 2 1 AGH University of Science and Technology, Krakow, Poland {szott,natkanie}@kt.agh.edu.pl
More informationIEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract
IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationFemto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks
Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks Wei Wang, Xiaobing Wu, Lei Xie and Sanglu Lu Nanjing University April 28, 2015 1/1 Heterogeneous Cellular Networks femto-cell
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationStimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing
Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing Naveen Shastry and Raviraj S. Adve Department of Electrical and Computer Engineering, University of Toronto 0 King s College
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationA COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING
A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University
More informationDesign Space Analysis for Modeling Incentives in Distributed Systems
Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed
More informationA Survey of Recent Results on Real-Time Wireless Networking
A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department
More informationMitigating Malicious Activities by Providing New Acknowledgment Approach
Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
More informationTHE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014
THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 Important notes about this examination 1. You have 40 minutes to complete this exam. 2. No electronic aides (e.g., phones or
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationHandover Incentives: Revised Model with Extensions for Uplink Traffic
Handover Incentives: Revised Model with Extensions for Uplink Traffic Xenofon Fafoutis 1 and Vasilios A. Siris 1, 2 1 Institute of Computer Science, Foundation for Research and Technology Hellas Heraklion,
More informationPrices and Auctions in Markets with Complex Constraints
Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationA Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks
A Self-Learning Repeated Game Framework for Optimizing Packet Forwarding Networks Zhu Han, Charles Pandana, and K.J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationDetection, penalization and handling of misbehavior in ad hoc wireless networks
IAENG International Journal of Computer Science, 33:1, IJCS_33_1_3 Detection, penalization and handling of misbehavior in ad hoc wireless networks Revoti Prasad Bora, Dheeraj Harihar and Saurabh Sehrawat
More informationAttackers. Abstract. probabilistic distributed MAC protocol, we focus our analysis on the IEEE MAC. Keywords
Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies Against Individual and Colluding Attackers Svetlana Radosavac University of Maryland, College Park John S. Baras University
More information