2018
DOI: 10.3390/s18020404
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Networks under a Backoff Attack: A Game Theoretical Perspective

Abstract: We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(26 citation statements)
references
References 32 publications
0
26
0
Order By: Relevance
“…In this article, we continue the work presented in Reference [8], where we studied a CSMA/CA network under a backoff attack. The network throughput was estimated using Bianchi's model [15], showing that a backoff attack did affect strongly to the network fairness, as misbehaving stations would achieve a larger portion of the network bandwidth at the expense of the stations that respected the backoff mechanism.…”
Section: Introductionmentioning
confidence: 64%
See 3 more Smart Citations
“…In this article, we continue the work presented in Reference [8], where we studied a CSMA/CA network under a backoff attack. The network throughput was estimated using Bianchi's model [15], showing that a backoff attack did affect strongly to the network fairness, as misbehaving stations would achieve a larger portion of the network bandwidth at the expense of the stations that respected the backoff mechanism.…”
Section: Introductionmentioning
confidence: 64%
“…Indeed, CSMA is a popular choice when designing MAC protocols [6,7]. However, the deferral mechanism of CSMA/CA is vulnerable to backoff attacks, as a station may not follow the backoff procedure in order to obtain an advantage in terms of bandwidth [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…At the MAC layer most attacks have found the IEEE 802.11 distributed coordination function (DCF) [16] an easy target. It has been shown in numerous studies that performing a backoff attack, i.e., changing the transmission deferment parameters (such as idle carrier sensing or backoff times) yields the attacker a considerable increase in throughput and access delays at the cost of neutral nodes [17], [18]. This type of attack has been extensively studied, though mostly in a single-hop setting which is not surprising given the single-hop nature of the MAC layer.…”
Section: Related Workmentioning
confidence: 99%