An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
|
|
- Jeremy Phillips
- 5 years ago
- Views:
Transcription
1 Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical and Computer Engineering Illinois Institute of Tecnology {jtang9, Weiua Zuang Electrical and Computer Engineering University of Waterloo Abstract Te distributed nature of te CSMA/CA based wireless protocols, e.g., te IEEE 802. distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate teir backoff parameters and tus unfairly gain a large sare of te network trougput. Te non-parametric cumulative sum (CUSUM) test is a promising metod for real-time misbeavior detection due to its ability to quickly find abrupt canges in a process witout any aprioriknowledge of te statistics of te cange occurrences. Wile most of te existing scemes for selfis beavior detection depend on euristic parameter configuration and experimental performance evaluation, we develop a Markov cain based analytical model to systematically study te CUSUM based sceme for real-time detection of te backoff misbeavior. Based on te analytical model, we can quantitatively compute te system configuration parameters for guaranteed performance in terms of average false positive rate, average detection delay and missed detection ratio under a detection delay constraint. Moreover, we find tat te sort-term fairness issue of te 802. DCF impacts te transition probabilities of te Markov model and tus te detection accuracy. We develop a suffle sceme to mitigate te sort-term fairness impact on te sample series, and investigate te proper suffle period (in terms of observation windows) tat can maintain te randomness in eac node s backoff beavior wile resolving te sort-term fairness issue. We present simulation results to confirm te accuracy of our teoretical analysis as well as demonstrate te performance of te developed real-time detection sceme. I. INTRODUCTION Te IEEE 802. based wireless networks ave been widely deployed over recent years due to teir ig-speed access, easy-to-use features and economical advantages. To resolve te contention issue among te multiple participating nodes, 802. employs te carrier sense multiple access/collision avoidance (CSMA/CA) protocol to ensure tat eac node gets a reasonably fair sare of te network. Tis is particularly te case for te distributed cooperation function (DCF) of 802., were every node accesses te network in a cooperative manner and randomly delays transmissions to avoid collisions by following a common backoff rule [ [3. However, in suc a distributed environment witout a centralized controller, a malicious node may deliberately coose a smaller backoff timer and gain an unfair sare of te network trougput at te expenses of oter normal nodes cannel access opportunities. Moreover, only to make tings worse, te easily available programmable and reconfigurable wireless network devices Tis work was supported in part by NSF grant CNS nowadays [4, [5 make te backoff misbeavior muc more feasible. In tis paper, we propose an analytical approac for real-time detection of te backoff misbeavior. An efficient detection sceme needs to address te two main correlated callenges: ) unknown misbeavior strategy, 2) real-time detection of te misbeavior. For te first callenge, since a malicious node can first beave as a normal node and ten manipulate its backoff timer to a random small value at any time, we ave no way to know te misbeavior strategy apriori. For te second, te misbeavior needs to be detected in real-time and we can ten isolate te malicious node to prevent it from bringing more arm to te network as soon as possible. Te existing solutions eiter can not address bot issues at te same time [5 [9, or require modifications to te 802. protocols [0, [. Considering te callenges, in our very recent work [2, we develop a detection sceme based on te non-parametric cumulative sum (CUSUM) test [3 wic can quickly find abrupt canges in a process witout any prior knowledge of te statistical model of te cange occurrences. In [2, we also propose a new observation metod to get samples for testing, wic directly counts te number of successful transmissions from a tagged node to facilitate te real-time detection. Also, our detection sceme does not require any modification to te protocols. Tus it can be implemented by any node assuming te role of te detection agent tat monitors te network. A significant open researc issue regarding te selfis beavior detection is tat most of te existing detection scemes depend on euristic parameter configuration and experimental performance evaluation. Suc a euristic approac largely limits te flexibility and robustness of te detection sceme; a cange of te operation context could trigger te retraining of te configuration parameters by experimenting over a large set of data traces and te performance under tose euristic parameters is not teoretically provable. In tis paper, we develop an analytical model for te CUSUM based detection sceme, wic can provide quantitative performance analysis and teoretical guidance on system parameter configuration. Specifically, we use a discrete-time Markov cain to model te beavior of te CUSUM detector, because te detector s value in an observation window only depends on its value in te previous window and te observation samples in te current window. To determine te transition //$ IEEE 638
2 probabilities of te Markov cain, we take te popular modeling tecnique [ tat eac node independently accesses an idle cannel for transmission wit a probability determined by its contention window size. Tis Markov cain based model enables us to conduct rigorous quantitative analysis of te detection sceme on tree fundamental metrics: average false positive rate, average detection delay, and missed detection ratio, and furter compute te system configuration for guaranteed performance. In particular, te Markov cain modeling te CUSUM detector takes different transition probabilities under te normal traffic condition and under te abnormal condition wit misbeaving nodes present, respectively. Te Markov cain obtained from te normal traffic condition can be used to directly calculate te average false positive rate and also provide te initial states for misbeavior analysis. Based on tese initial states, we can ten use te Markov cain under te abnormal conditions to analyze te average detection delay and te missed detection ratio. Note tat te missed detection ratio is not often considered in te context of CUSUM test due to its non-stop until detection property. In tis paper, we examine a missed detection ratio under a detection delay constraint, wic is of importance regarding real-time detection. To ensure te accuracy of our analytical model, we must take te well-known sort-term fairness issue regarding te 802. DCF [4 into account. Te sort-term fairness issue is inerent to te 802. backoff mecanism, by wic a successful node will ave advantages in grabbing te cannel for next few transmissions in a sort period. Suc an issue implies correlations among te cannel accesses, wic impact te accuracy of te transition probability calculation based on te assumption of independent cannel access. Te system configuration based on an inaccurate model will furter lead to inaccurate detection results. In order to address te sort-term fairness issue, we enance te detection sceme by applying a suffle strategy to te observation samples to mitigate te correlations among neigboring observations. Specifically, a sample value of te number of successful transmissions of te tagged node is calculated as te mean value over a few observation windows. Moreover, we also investigate ow to find a proper value for te suffle period (in terms of observation windows). A too sort suffle period could not effectively remove te sort-term fairness, wile a too long period will average out te randomness in te 802. backoff beavior. We would like to empasize tat te suffle sceme will not impact te detection delay, wic only requires a few normal observation samples to fill te observation windows in te suffle period wen te system turns up and ten works in a sliding window manner for detection. In summary, te main contributions of te paper come in four aspects: ) We develop a discrete-time Markov cain model to caracterize te CUSUM based detection system for te backoff misbeavior. 2) We utilize te model to guide te detection system configuration based on teoretical analysis for guaranteed performance. 3) We apply a suffle strategy to resolve te impact of te 802. sort-term fairness issue on te analysis and detection accuracy. 4) We provide simulation results to confirm te accuracy of our teoretical analysis and demonstrate te performance of te developed detection sceme. Te rest of te paper is organized as follows. Section II reviews more related work. Section III describes te system model. In Section IV, we present te detection sceme design wit te enancement of te suffle strategy. Section V develops te Markov cain based analytical model, and Section VI gives te teoretical performance analysis based on te Markov cain model. Section VII presents te simulation results, and Section VIII concludes te paper. II. RELATED WORK Te problem of detecting backoff misbeavior over 802. based wireless networks as been studied in various scenarios and under several matematical frameworks in te literature. In [0, [, te autors presented a modification to te 802. protocol to facilitate te misbeavior detection. In teir sceme, te receiver assigns a backoff timer for te sender. If te number of idle slots between consecutive transmissions from te sender does not comply wit te assigned backoff timer, te receiver will consider tat te sender potentially deviates from te protocol and penalize te sender wit a smaller backoff timer. Continuous deviations will result in tat te receiver labels te sender as a selfis node. However, te above sceme assumes a trustworty receiver wic performs te detection, wic may not be te case in a dynamic network environment. Modification to te 802. protocol and reliance on te receiver are te main limitations of te work. Anoter approac to deal wit te backoff misbeavior is to develop protocols based on te game-teoretic tecniques, by imposing adequate costs on network operations [5 [7. Te goal is to encourage all te nodes to reac a Nas equilibrium. As a result, a malicious node is not able to gain an unfair sare compared to well-beaved nodes and are tus discouraged from te misbeavior. However, tis category of approaces assume tat all te nodes are willing to deviate from te protocol wen necessary, and performance of te network may converge to a suboptimal operation point. Moreover, modifications to te standard protocols are also required. A euristic sequence of conditions are proposed in [8, [9 to test multiple misbeavior options in te 802. protocol based on simple numerical comparisons. Te detection algoritm estimates te average values of te option parameters and raises alarms wen te cumulative effect of te misbeavior exceeds a tresold. Tis approac, named DOMINO, preserves its advantage of simplicity and easiness of implementation, and still demonstrates its efficiency wen dealing wit a wide range of 802. MAC misbeavior. However, te specific conditions limit its applications to certain protocols. Te sequential probability ratio test (SPRT) metod is used in [7 [9 to detect te 802. backoff misbeavior. Te detection decision is made wen a random walk of te likeliood ratio of observations (given two ypoteses) rises greater tan an upper tresold. Te main advantage of SPRT 639
3 is tat it can reac decision very fast, given te complete knowledge of bot normal beavior and backoff misbeavior strategy [20. However, in a realistic setting, te strategy of malicious nodes is ard to know in advance; suc an issue imposes te major inerent limitation of te SPRT metod. Furter, te existing work normally assumes tat te backoff timer of eac node is observable, wic is again ard to acieve in practice because te transmission attempts involved in a collision are impossible to be distinguised. Tus in our detection we monitor te successful transmission of te tagged node as te observation measurement. Te autors in [5, [6 utilize te Kolmogorov-Smirnov (K- S) significance test to address te detection problem assuming an aprioriknown misbeavior strategy model. Tis test is able to make te decision by comparing te distribution of sampled traffic data wit te normal-beavior distribution estimated online. Noneteless, as a batc test metod, te K-S statistic as its own drawback. Fixed-size data samples are needed to perform te test eac time, wic actually makes realtime detection impossible. Even in te modified sequential truncated K-S test, a stage number N [5 still needs to be predetermined before test starts in order to get a proper significant level for eac test step. In our very recent work [2, we propose to adopt te non-parametric CUSUM cange point test [3 for te backoff misbeavior detection, wic as te advantages of bot real-time detection and no requirement of aprioriknowledge of te misbeavior strategy. However, a common issue among most of te existing scemes for misbeavior detection is teir dependency on euristic parameter configuration and experimental performance evaluation, wic largely limits te flexibility and robustness of te scemes. III. SYSTEM MODEL In tis section we provide a brief description of te IEEE 802. DCF and ow a malicious node can utilize te vulnerability of te DCF to gain advantages over oter normal nodes troug backoff misbeavior. A. IEEE 802. DCF Tere are two major functions in te IEEE 802. protocols: te point coordination function (PCF) and te distributed coordination function (DCF). Te PCF is a centralized function and is an optional feature in In tis paper, our concentration is te more widely used DCF wic operates in a distributed manner. In te DCF, every node contends for access to te wireless medium following te CSMA/CA function [. Wen a node attempts to transmit a packet, it needs to sense te medium idle for a specified time. Te time is divided into slots, and a node can only transmit at te beginning of a slot time. If te medium is not idle, te node will enter a backoff stage and defer te transmission according to a timer before attempting te next transmission. Tis backoff timer is a random value uniformly selected from a set {0,,..., CW min }, were CW min is called te minimum contention window wit a standard value of 32. Te timer will decrease if te medium is continuously sensed idle and freeze wenever te medium is sensed busy. After te timer reaces 0 te node will attempt anoter transmission. Eac unsuccessful transmission due to reasons suc as collisions or lost of ACK messages from te reception node will result in a doubled contention window size until it reaces te maximum contention window CW max =2 m CW min, were m is called te maximum backoff stage wit a standard value of 5. Tis operation is also referred to as te binary exponential backoff sceme. After a successful transmission, te node will reset te contention window to te minimum value CW min and continue sensing te medium if it as more packets to transmit. B. Backoff Misbeavior in IEEE 802. DCF A malicious node does not need to misbeave if no one else is contending for te network access wit it and te effect of te misbeavior may be ignorable. Terefore we assume tat te 802. wireless network works in te saturated condition, were every participating node always as packets to transmit. As a distributed contention based protocol, te DCF assumes tat every node in te network operates in accordance wit te protocol rules as described above to obtain a fair sare of te wireless medium. However, a node wic as te smallest backoff timer will obviously be favored by te protocol as it can always obtain more cances to transmit wile oter nodes are still in te backoff stage. Since tere is no central controlling unit wic assigns te backoff timer for eac node, a malicious node can continuously coose a small backoff timer and ten gain significant advantages in cannel access probability over oters. Moreover, because te increased transmission probability of te malicious node causes more collisions, normal nodes are forced to furter exponentially defer teir transmissions as tey operate according to te protocol, wic results in te malicious node gaining more advantages. Te backoff misbeavior can drastically decrease te transmission probability of normal nodes and subsequently severely downgrade teir trougput. In some extreme case were a malicious node sets its own backoff timer to a very small constant value, it will lead to denial of service (DoS) of te wole network except for te malicious node itself. Tus, a detection sceme capable of quickly and accurately identifying te misbeaving malicious node is igly desired for te normal operation of an IEEE 802. wireless network. IV. DETECTION SCHEME DESIGN In tis section, we describe te CUSUM based backoff misbeavior detection sceme design, enanced wit a suffle mecanism to mitigate te sort-term fairness impact. A. Te Observation Measure Consider a tagged node v. In our detection system, te observation measure is te number of successful transmissions of te tagged node v, denoted as M v,ineverym successful transmissions over te wole network. Under te 802. DCF, M n is a random variable. We take te popular modeling tecnique [ tat eac node independently accesses an idle 640
4 cannel for transmission wit a probability determined by its contention window size. If we use qs v to denote te probability tat a successful transmission over te network is from node v, we could ave te binomial distribution of M v as P {M v = k} = ( M k ) (q v s ) k ( q v s ) M k. () In a normal situation tat every node uses te same contention window size and follows te 802. DCF model, it can be seen tat qs v = N under te independent cannel access assumption and fair cannel saring, given N nodes in te network. If node v is a malicious node taking a smaller contention window size, it will acieve a qs v larger tan N and tus a larger portion of te network trougput. In Section V, we will present ow to calculate qs v given te contention window size. Te distribution of M v in () is te basis to establis our analytical model. B. Suffle Strategy Te sort-term fairness issue is inerent to te 802. backoff mecanism by wic a node tat as just accomplised a successful transmission will ave advantages in grabbing te cannel for next transmission in a sort period [4. Suc an issue implies correlations among te cannel accesses, wic impact te accuracy of () to model te successful transmissions of te tagged node based on te assumption of independent cannel access, and will in turn impact te accuracy of te analytical model later. Intuitively, if we always assume a fair cannel saring for te normal condition, te sort-term fairness issue poses significant difficulties in distinguising between te backoff misbeavior of a malicious node and te sort-term monopolization of a normal node, wic may result in significant false positives for a detection sceme. Directly computing te distribution of M v under te sortterm fairness impact is difficult. A possible approac to adapt to te sort-term fairness issue is to measure te distribution from te training data. However, tis approac requires an excessive number of experiments to ave compreensive training data sets for different traffic conditions and tus lacks te flexibility. We owever coose to apply a suffle strategy to te observation samples to mitigate te sort-term fairness issue. Rater tan directly using te observation measure in te current observation window, we average te observation measures over I windows, termed as suffling wit a period v of I. Let M n denote te raw observation witout suffling at window n, and Mn v te suffled observation. We apply a sliding window mecanism for suffling as I Mn v = M I n i. v (2) i=0 We expect tat different nodes may take sort-term advantages in different observation windows; suc a suffling average could dilute te correlations in eac window. Wit te sortterm fairness impact mitigated by te suffle mecanism, te binomial distribution in () can still be applied. Te value of te suffle period I needs to be properly selected. A too sort I could not effectively remove te correlations among observation measures, wereas a too long I will average out te random operation of te 802. backoff mecanism. We will resort to simulations to sow tat an optimal I does exist resulting in accurate analytical results based on (). C. CUSUM Based Detection Considering te callenges on real-time detection of te unpredictable backoff misbeavior, we design our detection sceme based on te non-parametric CUSUM test [3 due to its robust ability to quickly find abrupt canges in a process witout any prior knowledge of te statistical model of te cange occurrences. For convenience, let {M n,n =0,,...} be te sequence of te number of successful transmissions of te tagged node in eac observation window and u be te upper bound of te expectation of M n. Here, we drop te superscript of v for easier presentation considering te clear context. We ten ave te CUSUM test statistic X n =(X n +(M n u)) + X =0 (3) were (x) + = x if x 0 or 0 oterwise. Note tat if te tagged node acts normal, X n will stay around 0 no matter ow long te normal beavior as been observed. However, wen te node turns to misbeave, X n will quickly accumulate to a large positive. Let be te detection tresold, ten te decision rule of te test in step n is { if Xn δ n = (4) 0 if X n < were δ n is also an indicator function of weter te detection event appens or not. Te detector value X n will be reset back to 0 as soon as it exceeds te tresold and te detection procedure starts over again. V. MARKOV CHAIN BASED MODEL Consider te sequence {X n } as a discrete random process, wic takes values from a finite set A = {0,, 2,..., }. Te process is said to be in state j at time n if X n = j and in state i at time n if X n = i, were i, j A. Te transition between te states appens at te end of every observation window M. According to (3), te current state X n depends only on te state X n and is independent of any oter previous states, were te transition probability is P ij = P {X n = j X n = i}. (5) Tus te random process {X n } satisfies te Markov property and can be modeled as a discrete-time Markov cain. Given te decision tresold, te Markov cain is ten described by a ( +) ( +) transition probability matrix 64
5 as P 00 P 0 P P 0 P 0 P P 2... P P = P 0 P P 2... P Tis transition probability matrix can be divided into four distinct groups based on te operation of te CUSUM detector. Group consists of P ij for i [0, and j =0, wit values { P {Mn (u i)} if u i 0 P i0 = (6) 0 oterwise Tis group is related to te transitions to state 0. According to (3), te state X n is always reset to 0 from i wen i+m n u 0. Tus te transition probability is P {M n (u i)} as sown in (6). Note tat it is impossible to reac state 0 wen u i<0 due to nonnegative value of M n. Group 2 consists of P ij for i [0, and j [,, wit values { P {Mn =(j i + u)} if j i + u 0 P ij = (7) 0 oterwise Tis group is about te transitions to all te states oter tan 0 and. Again te transitions are according to te CUSUM detector s beavior (3) and te fact tat M n is nonnegative. Group 3 consists of P ij for i [0, and j =, wit values P i = P ij. (8) j=0 Tis group is about te transitions to state. Note tat state in fact incorporates all possible values X n. Finally, group 4 consists of P ij for i = and j [0,, wit values { if j =0 P j = (9) 0 oterwise Tis group is related to te transition from to any oter states, according to te beavior tat te detector value will be reset to 0 as soon as it exceeds. VI. THEORETICAL PERFORMANCE ANALYSIS In tis section, we conduct rigorous teoretical performance analysis of te detection sceme based on te Markov cain model in terms of te tree fundamental metrics to cange detection: average false positive rate, average detection delay, and missed detection ratio under a detection delay bound. Ten we sow ow we can configure te system parameters to acieve guaranteed performance. We consider a network wit N nodes, and eac node always as data to transmit (i.e., in te saturated condition). In all te analysis, we consider tat te suffle mecanism is applied and tus te analysis could be based on (). Te observation window size is M =30. P fp Fig.. Average false positive rate. A. Average False Positive Rate Te average false positive rate P fp is te rate tat te detector value X n its state given te fact tat tere is no node in te network misbeaving. According to te teory on te discrete-time Markov cain, suc a rate is equal to te steady-state probability tat te Markov cain describing te CUSUM detector stays at in te normal condition. In te normal condition wit a fair sare of te cannel access, we ave qs v = N for a tagged node. We can calculate te distribution of M n according to (), and furter obtain te transition probabilities matrix P according to (6) (9). Let (π 0,..., π ) denote te steady state probabilities of Markov cain, wic could be solved from te equations π j = π i P ij, for j {0,..., } (0) i=0 π j =. () j=0 Ten we can get te average false positive rate P fp = π. (2) Te analytical result (2) allows us to numerically examine te impact of te two fundamental parameters and u on te false positive rate P fp of te CUSUM detector. As an example, we compute te results for a network wit N =0 nodes, and te results are illustrated in Fig.. Te logaritmic scale is used in te figure for te vertical axis. Te minimum value of u is set to 3 as it represents te upper bound of te expectation of M n, wic is M/N in te normal condition. From te figure, we can observe tat a larger or a larger u yields a smaller false positive rate, as expected. B. Average Detection Delay In tis subsection we analyze te average detection delay denoted as, wic is te average number of samples observed from te moment tat te tagged node starts to 642
6 misbeave until te misbeavior is detected. Wit te Markov cain under te abnormal condition (abnormal Markov cain), can be computed as te expected number of transitions required for te state variable to it state, starting from te moment wen te misbeavior starts. To carry out te analysis, we need to find te transition probabilities of te abnormal Markov cain and determine te initial state of te CUSUM detector wen te misbeavior starts. ) Transition Probabilities under te Misbeavior: We consider a network consisting of two classes of nodes. Class includes te one misbeaving node wit a small minimum contention window CW min denoted as W, and class 0 includes all te normal nodes wit te standard minimum contention window denoted as W 0. According to te classic modeling approac for te 802. DCF [, we consider tat eac node independently accesses an idle cannel for transmission. Let p i t denote te probability tat a class i (i 0, ) node transmits at a random time slot and p i c denote te collision probability of a class i node. Also recall tat N is te number of nodes and m is te maximum backoff stage. According to [, we ave te following equations: p 0 2( 2p 0 t = c) ( 2p 0 c)(w 0 +)+p 0 cw 0 ( (2p 0 c) m ) p 2( 2p t = c) ( 2p c)(w +)+p cw ( (2p c) m (3) ) p 0 c = ( p t )( p 0 t ) N 2 p c = ( p 0 t ) N from wic te four parameters p 0 t, p t, p 0 c and p c can be solved. Note tat a node can get a successful transmission under te circumstance tat tere is no collision wile te node transmits. Tus from te solutions of (3), we can obtain te probability tat a node gets a successful transmission at a random time slot: p 0 s = p 0 t ( p 0 c) (4) p s = p t ( p c). (5) We can ten calculate te probability ˆq s tat a successful transmission over te network is from te malicious node as (5): ˆq s = p s +(N )p 0. (6) s Using ˆq s in (), we can obtain te probability distribution of M n for te misbeaving node; using suc M n distribution in (6) (9), we can ten compute te transition probability matrix ˆP for te abnormal Markov cain. It is wort noting tat altoug we only include two classes of nodes in te above analysis, te model of (3) to (6) can be easily extended to cases were multiple classes of misbeaving nodes wit different intensities of misbeavior exist. Tis will enable us to analyze muc more complicated misbeaving scenarios. p s 2) Initial States: A natural tougt of te initial state of X n is 0 wen te misbeavior starts. However, tis may not be te case; before a malicious node starts to misbeave, it can beave like a normal node and still affect X n. Tus X n can be initially at any state following te normal Markov cain except for state, as we do not consider an already alarmed state as an initial state. We can calculate te steady state probabilities of te normal Markov cain according to (0) and (). Since we are interested in detection starting from an unalarmed state, under suc a constraint te conditional initial state probabilities sould be π i π i = i=0 π for i {0,..., }. (7) i 3) Average Detection Delay: As we ave various initial states, te average detection delay sould be calculated as te weigted average of te expected numbers of transitions from every initial state to state based on te transition probability matrix ˆP. Let μ i, i [0, denote te expected number of transitions for state i to state. According to [2, te values of μ i can be solved from te equations μ i =+ ˆP ir μ r for i {0,..., }. (8) r = were ˆP ir is te transition probability from state i to r of ˆP. Based on te solutions of (7) and (8), we can obtain te average detection delay as = π iμ i. (9) i=0 Te analytical result (9) allows us to numerically examine te impact of and u on te average detection delay of te CUSUM detector. As an example, we compute te results for a network wit N =0nodes, and te results are illustrated in Fig. 2. Specifically, Fig. 2 sows te analysis results under four misbeaving intensities CW min = 4, CW min =8, CW min =6and CW min =24. As we expect, te figure illustrates tat more intense misbeavior leads to a sorter detection delay. Also, we observe tat a smaller and a smaller u yield better performance in average detection delay. C. Missed Detection Ratio In tis subsection we discuss te missed detection ratio, denoted as P md. Te missed detection ratio is not often considered in te context of CUSUM test due to its non-stop until detection property. We owever examine te P md under a given detection delay constraint D, wic is of importance regarding real-time detection. Te detection event appens only wen X n its state. Tus te missed detection ratio P md under te delay constraint D is te summation of te probabilities of X n staying at a state oter tan at time D. Wit te transition probability matrix ˆP, te missed detection ratio could be computed in an iterative 643
7 (a) (b) (c) (d) Fig. 2. Average detection delay. (a) CW min =4.(b)CW min =8.(c)CW min =6.(d)CW min =24. P md (a) P md Fig. 3. Missed detection ratio. (a) D =8.(b)D =6. manner. Let te row vector P (j) =[P 0 (j),,p (j) denote te probabilities of te state variable at step j wit 0 j D. Te computation starts from te initial states given in (7), setting P i (0) = π i, i [0, (20) P (0) = 0. (2) At eac transition step j [0,D, te state probabilities are updated as (b) P (j) = P (j ) ˆP (22) P (j) =0. (23) At eac step, P (j) is set to 0 for next step computation because we are interested in te missed detection cases. Te missed detection ratio under te delay bound constraint D can be obtained as P md = P i (D). (24) i=0 Fig. 3 demonstrates te missed detection ratios P md of our analysis under te delay constraints D = 8 and D = 6, for a misbeaving node wit te moderate misbeavior of CW min =6. We observe tat te longer te constraint is, te lower te missed detection ratio will be. Or in oter words, te probability of detection increases wit a cost of longer delay. Also, a low and a low u yield better missed detection ratio. D. System Configuration under Performance Constraints Te above teoretical analysis provides us a guideline to configure te system parameters and u for guaranteed performance. For eac performance metric, we can obtain te feasible ranges of and u to satisfy te performance constraint. Ten wit te intersection of te parameter ranges under all te constraints, we expect to obtain te proper configuration of and u tat meet te performance requirements of all te metrics. In our analytical results presented above, we notice tat te metrics are more sensitive to te cange of u tan. Tus a rule of tumb for configuration is to first concentrate on finding a proper u and ten refine it by determining an appropriate. Moreover, once we determine a set of configuration parameters, we could explicitly know te target performance measures. In practice, as we do not ave aprioriknowledge of te misbeavior, te analytical model allows us to conservatively configure te system so tat even te misbeavior wit a low intensity could be detected wit good performance. For example, if we select = 7 and u = 5 for system configuration, our analytical model can tell tat even for te moderate misbeavior wit CW min =6, we target ig level of performance wit te false positive rate of , te average detection delay of observation windows, and te missed detection ratio of wit te delay constraint D =6. In next section, we will use simulation results to demonstrate tat our target performance measures are indeed acieved. VII. SIMULATION RESULTS A. Simulation Setup We establis an 802. DCF based wireless network consisting of 0 competing nodes and an access point (AP) troug ns-2 [22 simulation. Te network works under te saturated condition and every node sends constant traffic via UDP towards te AP. Te AP also acts as te detection agent wic monitors te transmissions from all te competing nodes and runs te CUSUM based detection sceme based on te collected samples. Te nodes are located close enoug to eac oter and can ten sense te transmissions from oters to avoid te idden terminal problem. Tere is misbeaving node among te 0 competing nodes, wic accesses te wireless cannel using te binary exponential backoff sceme 644
8 CDF of X n I= 0.86 I=2 I= I=4 Analytical X n P fp I= I=2 I=3 I=4 Analytical 0 Fig. 4. CDF of X n under different observation window sizes. Fig. 5. Average false positive rate. but can manipulate its minimum contention window CW min to any value between and 32. Due to te conflicting nature of te tree performance metrics, it is impossible to find te system configuration parameters tat acieve best performance at all fronts. However, as discussed in te previous section, we find tat te performance metrics are more sensitive to u and for u =5a good tradeoff can be acieved among te metrics. Terefore in our simulation, we adopt 5 as te value of u to furter evaluate te performance of our detection. B. Suffle Period Selection As described in te pervious section, te sort-term fairness issue makes te binomial modeling of M n not accurate due to te correlations among successful transmissions, wic furter impacts te transition probabilities of te Markov cain model and tus te accuracy in system configuration and detection performance. Here we examine te efficiency of te suffle mecanism in mitigating suc an issue. Since te sort-term fairness issue is inerent to te 802. DCF independent of weter te misbeavior presents or not, we study te selection of te suffle period in te normal traffic condition and ten examine te efficiency of te determined suffle period in misbeavior detection. Te purpose of te suffle mecanism is to mitigate te correlations in cannel access, tus its efficiency could be demonstrated if te distribution of te CUSUM statistic X n obtained in simulations wit te suffling applied matces te analytical results based on te independent model of (). In Fig. 4, we present te simulation results of te cumulative distribution function (CDF) of X n under different suffle period, compared wit te analytical CDF. Te configuration parameters are = 7 and u = 5. We note tat te curve closest to te analytical one is I =2. We ten examine te false positive rate troug comparing te analytical results wit te simulation results wit u =5and taking various values in Fig. 5. Again, te false positive rate curve obtained from I =2most resembles te analytical model. Based on Analytical Simulation (a) Analytical Simulation 3 Fig. 6. Average detection delay. (a) CW min =8.(b)CW min =6. te experimental results, we can euristically determine tat I =2is te optimal suffle period. According to our conjecture tat te sort-term fairness issues is inerent to te 802. DCF, an effective suffle period in te normal condition sould also apply in te condition wit misbeavior. We ten simulate te average detection delays under different misbeaving intensities and apply te suffle period of 2. Te simulation results and analytical results of te average detection delay are presented in Fig. 6. Te closeness of te two curves confirm te efficiency of te suffle mecanism in ensuring an accurate detection system. C. Performance Guarantee TABLE I COMPARISON OF ANALYTICAL AND SIMULATION RESULTS WITH =7, u =5, D =6 (b) P fp P md Analysis Simulation Given te configuration parameters =7and u =5,we compare te target performance measures (referring to VI-D) wit te simulation results under te same setting in Table I to examine weter te target performance is guaranteed. 645
9 Fig CW min Average detection delays under different misbeavior intensities. We can see tat simulation results are very close to te target values in all tree performance metrics. Te small gap between te values is largely due to te variance in te observation samples; also te suffle mecanism is not 00% accurate according to Fig. 4 and 5. Considering suc a small gap, in practice we could on purpose select configuration parameters to conservatively provision te detection performance. Fig. 7 sows te average detection delays of our sceme under different misbeavior intensities, indicated by te size of te minimum contention window CW min of te malicious node. It is observed tat our sceme generally performs very well wen detecting more intense misbeavior. For example, it takes less tan 2 samples for CW min 0 and less tan 0 samples for CW min 8. Te detection performance degrades against less intense misbeavior as te malicious node s cance of successful transmissions gets lower and te small advantages gained by te malicious node is easily smooted out in a suffle period. However, as practically a malicious node as to coose more intense misbeavior to gain more benefits, our sceme can sow its advantages in suc cases. VIII. CONCLUSION In tis paper we propose an analytical approac to real-time backoff misbeavior detection in IEEE 802. based wireless networks. We first develop a Markov cain based model to caracterize te beavior of te non-parametric CUSUM detector used in our detection. Wile most existing work for backoff misbeavior detection depends on euristic parameter configuration and experimental performance evaluation, we are able to use our model to quantitatively study te system configuration parameters to acieve guaranteed detection performance in terms of te tree fundamental metrics. Moreover, realizing tat te sort-term fairness issue of 802. affects te transition probabilities of te Markov cain model and tus te detection accuracy, we apply a suffle strategy to mitigate te impacts and also investigate te proper value of te suffle period. Finally, we present simulation results tat confirm te accuracy of our teocratical analysis and demonstrate te performance of te CUSUM based detection sceme. In our future work, we will study ow to systematically compute optimal system configuration parameters based on our analytical model. Also, we will expand our work to distributed misbeavior detection, were cooperation among several detection agents and joint distribution analysis are to be employed. REFERENCES [ G. Bianci, Performance analysis of te IEEE 802. distributed coordination function, IEEE J. Sel. Areas Commun., vol. 8, no. 3, pp , Mar [2 H. Zai, X. Cen and Y. Fang, How well can te IEEE 802. wireless LAN support quality of service? IEEE Trans. Wireless Commun., vol. 4, no. 6, pp , Nov [3 Y. Ceng, X. Ling, W. Song, L. Cai, W. Zuang, and X. Sen, A crosslayer approac for WLAN voice capacity planning, IEEE J. Sel. Areas Commun., vol. 25, no. 4, pp , May [4 Te MAdWiFi Driver, [Online. Available: ttp:// [5 A. Toledo and X. Wang, Robust detection of selfis misbeavior in wireless networks, IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp , Aug [6 A. Toledo and X. Wang, A robust Kolmogorov-Smirnov detector for misbeavior in IEEE 802. DCF, in Proc. IEEE ICC, 2007, pp [7 S. Radosavac, J. S. Baras and I. Koutsopoulos, A framework for MAC protocol misbeavior detection in wireless networks, in Proc. ACM Worksop on Wireless Security, 2005, pp [8 S. Radosavac, G. Moustakides, J. Baras and I. Koutsopoulos, An analytic framework for modeling and detecting access layer misbeavior in wireless networks, ACM Trans. Information and Systems Security, vol., no. 4, article no. 9, Jul [9 Y. Rong, S. Lee and H. Coi, Detecting stations ceating on backoff rules in 802. networks using sequential analysis, in Proc. IEEE INFOCOM, 2006, pp. 3. [0 P. Kyasanur and N. Vaidya, Detection and andling of MAC layer misbeavior in wireless networks, in Proc. IEEE DSN, 2003, pp [ P. Kyasanur and N. Vaidya, Selfis MAC layer misbeavior in wireless networks, IEEE Trans. Mobile Comput., vol. 4, no. 5, pp , [2 J. Tang, Y. Ceng, Y. Hao and C. Zou, Real-time detection of selfis beavior in IEEE 802. wireless networks, in Proc. IEEE VTC-Fall, 200. [3 B. Brodsky and B. Darkovsky, Nonparametric Metods in Cange- Point Problems. Kluwer Academic Publiser, 993. [4 C. E. Koksal, Hi. Kassab and H. Balakrisnan, An analysis of sort-term fairness in wireless media access protocols, in Proc. ACM SIGMETRICS, [5 M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, On ceating in CSMA/CA Ad Hoc networks, Tec. Rep. LCA-REPORT , [6 J. Konorski, Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting, in Proc. 6t International Conference on Protocols for Multimedis Systems (PROMS), 200. [7 J. Konorski, Multiple access in Ad-Hoc wireless LANs wit noncooperative stations, in Proc. 2nd International IFIP-TC6 Networking Conference on Networking Tecnologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications (NETWORKING), [8 M. Raya, J. Hubaux and I. Aad, DOMINO: A system to detect greedy beavior in IEEE 802. otspots, in Proc. ACM MobiSys, [9 M. Raya, I. Aad, J. Hubaux and A. El Fawal, DOMINO: Detecting MAC layer greedy beavior in IEEE 802. otspots, IEEE Trans. Mobile Comput., vol. 5, no. 2, pp , Dec [20 H. V. Poor and O. Hadjiliadis, Quickest Detection (st ed.), Cambridge Univ. Press, [2 J. R. Morris, Markov Cains, Cambridge Univ. Press, 997. [22 Te Network Simulator - ns-2, [Online. Available: ttp:// nsnam/ns. 646
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationCooperation in Wireless Ad Hoc Networks
Cooperation in Wireless Ad Hoc Networks Vikram Srinivasan, Pavan Nuggealli, Carla F. Ciasserini, Rames R. Rao Department of Electrical and Computer Engineering, University of California at San Diego email:
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationA Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE DCF
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. A Robust Kolmogorov-Smirnov Detector for Misbehavior
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationAuthor's personal copy
Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission
More informationMAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science
MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More informationA Statistical Approach for Target Counting in Sensor-Based Surveillance Systems
Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationReal-Time Wireless Routing for Industrial Internet of Things
Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationNetwork Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks
Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationFault Localization Using Tarantula
Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationFeature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu
More informationUNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING
UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,
More informationGeorge Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of
IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationIntegrating Multimedia Applications in Hard Real-Time Systems
Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationTraffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks
Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More informationITERNET of Things (IoT) envisages a future in which a large
IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationMOST COMMUNICATION protocols were designed
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments Alvaro A Cárdenas, Member, IEEE, Svetlana Radosavac, Member, IEEE, and John S
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More informationRedundancy Awareness in SQL Queries
Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More informationA Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image
Journal of Computer Science 5 (5): 355-362, 2009 ISSN 1549-3636 2009 Science Publications A Practical Approac of Selecting te Edge Detector Parameters to Acieve a Good Edge Map of te Gray Image 1 Akram
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationSLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University
SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal
More informationAsynchronous Power Flow on Graphic Processing Units
Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationA Comparative Analysis on Backoff Algorithms to Optimize Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771
More informationMean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.
Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationVector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More informationIntroduction to Computer Graphics 5. Clipping
Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,
More informationDynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks
Dynamic Cannel Assignment and Reassignment for Exploiting Cannel Reuse Opportunities in Ad Hoc Wireless Networks Ci-Yung Cang *, Po-Ci Huang *, Cao-Tsun Cang +, and Yu-Syan Cen ++ * Department of Computer
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationSolutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch
Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/
More informationTruncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation
NUMERICAL MATHEMATICS: Teory, Metods and Applications Numer. Mat. Teor. Met. Appl., Vol. xx, No. x, pp. 1-18 (200x) Truncated Newton-based multigrid algoritm for centroidal Voronoi diagram calculation
More informationDesign of PSO-based Fuzzy Classification Systems
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,
More informationA Novel QC-LDPC Code with Flexible Construction and Low Error Floor
A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationHASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS
HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece
More informationSEATTLE: A Scalable Ethernet Architecture for Large Enterprises
TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of
More informationSensor Data Collection with Expected Reliability Guarantees
Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationAn Overview of New Features in
6. LS-DYNA Anwenderforum, Frankental 2007 Optimierung An Overview of New Features in LS-OPT Version 3.3 Nielen Stander*, Tusar Goel*, David Björkevik** *Livermore Software Tecnology Corporation, Livermore,
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationRECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL
IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract
More informationMulti-View Clustering with Constraint Propagation for Learning with an Incomplete Mapping Between Views
Multi-View Clustering wit Constraint Propagation for Learning wit an Incomplete Mapping Between Views Eric Eaton Bryn Mawr College Computer Science Department Bryn Mawr, PA 19010 eeaton@brynmawr.edu Marie
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationTwo-phase Collision Avoidance to Improve Scalability in Wireless LANs
Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,
More informationNon-Interferometric Testing
NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault
More informationLaser Radar based Vehicle Localization in GPS Signal Blocked Areas
International Journal of Computational Intelligence Systems, Vol. 4, No. 6 (December, 20), 00-09 Laser Radar based Veicle Localization in GPS Signal Bloced Areas Ming Yang Department of Automation, Sangai
More informationCommunicator for Mac Quick Start Guide
Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main
More information