A Presentation on: Resilient MAC Protocol RESI-MAC. A Game Theoretic Solution. By: Jacob Abegunde Supervisors : 1 Dr. Hannan & Dr.
|
|
- Gervais Willis
- 7 years ago
- Views:
Transcription
1 A Presentation on: Resilient MAC Protocol RESI-MAC A Game Theoretic Solution By: Jacob Abegunde Supervisors : 1 Dr. Hannan & Dr. Joseph
2 Agenda 2 1. Introduction & Background 2. The Problem: MAC Vulnerabilities 3. Solutions Categories 4. Game Theoretic Solution 5. Our Game Model & Strategy 6. Simulation Result 7. Question Time
3 INTRODUCTION: Wireless Networks Ad hoc Mode Infrastructure Mode 3
4 BACKGROUND: Wireless MAC Protocol 4 IEEE MAC Handshake RTS from Sender to Receiver CTS from Receiver to Sender DATA from Sender to Receiver ACK from Receiver to Sender
5 MAC Protocol Vulnerabilities 5 The Problem MAC Protocol is vulnerable to various misbehaviour techniques such back-off cheating, CW cheating, NAV cheating, de-authentication, de-association etc. The vulnerabilities can be classified into: Share medium vulnerabilities, Identity vulnerabilities, protocol vulnerabilities and Human or Vendor factor The exploitation of these vulnerabilities has led to various version of denial of service (DoS) attack. There is NO single fix solution yet, Unfortunately.
6 Solutions Categories Prevention, Detection & Reaction Some are based on developing a long-term profile of normal activities (Anomaly Detection) They identify misbehaviour by observing deviations from such profile 6 Some are base on systematic evaluation of communication parameters (Heuristic Method) They identify misbehaviour using deviation from known rules or probability method
7 Solutions Categories CONT D 7 Prevention, Detection & Reaction Some are based on principles adapted from the Human immune system (Artificial Intelligent) Low computation overhead but high profiling time OUR APPROACH Our approach is based on the mathematical model of conflicts and resolution (Game Theory) A Game G consist of : {Players, Strategies, Utilities} Assumptions of rationality (which is difficult to avoid and difficult to justify a bit of dilemma)
8 Advantages Of Game Theoretic Solutions 8 It can be use for Analysis of distributed systems The existence, uniqueness and convergence to a steady state operating point (possibility) Design of incentive and disincentives schemes Different strategies of played can be modelled Cooperation between strategic players can be stimulated Complex Interaction (between players) can be modelled
9 The Challenges Of Game Theoretic Solutions Assumption of Rationality (Highly Controversial) Realistic scenarios require complex models Complexity in Choice of Utility functions 9
10 Previous Game Solutions M.Cagalj et al. (2005), showed how a small proportion of selfish node can degrade network performance. 10 Konorski et al (2006), presented a retaliatory game in which nodes probabilistically select a response between cooperation and selfishness whenever selfish behaviour is observed.
11 Previous Game Solutions CONT D Boyer et al. (2012), proposed a game to share available medium among cooperative nodes and retaliate against selfishness nodes They also proposed a reputation-based Tit-for- Tat (TFT) mechanism 11 Shivshankar et al. (2012), applies conditional TFT and unconditional altruism as a solution concept in Vehicular Networks.
12 Previous Game Solutions CONT D Lin Chen and Leneutre, J. (2007) examined the question of how bad IEEE DCF will performs if all nodes are selfish? They demonstrated that: Selfishness is Not Always A Nightmare as long as nodes plays TFT 12
13 Previous Game Solutions CONT D Seredynski et al. (2012), demonstrated that, as long as at least 70 per cent of nodes follow the TFT principle in packet transmission, the benefits of the use of TFT strategy exceed the costs. 13 They suggested that strong retaliators (i.e noncooperative nodes) could be used to enforce the desire cooperation through TFT strategy
14 The Research Gap 14 Unfortunately, the problem remains unsolved according to M. Eian and S.F. Mjolsnes (2012) and Ahmad et al (2011) They demonstrated a deadlock vulnerability against IEEE w (the secured version of MAC protocol) The TFT strategy being employed as a solution has its own deadlock vulnerability and hence the need for a research work of this nature.
15 Our Motivation: Why the choice of Game? 15 EACH SOLUTION METHOD HAS ITS OWN CHALLENGE Prevention methods have their limitations Detection methods are somehow awkward, error prone and subject to evasion Punishment schemes are like aiming to shoot moving targets: It s easier said than done! Reputation is based on past track record, but WLAN environment is dynamic and volatile So, we think Game has good prospect here
16 Our Game Solution 16 Is it a Misbehaviour Prevention method? ==> NO, not at all, that is NOT our goal (Realistic?) Is it a Misbehaviour Detection method? ==> NO, but we are interested in transmission failure Is it a Punishment Scheme? ==> NO, not really, we are not after cheating nodes What is it then? Just as its named : IT S A GAME IT IS A RETALIATORY GAME A Strategic Interaction between players (Nodes)
17 The Game Model RESI-MAC = G { N, S i, {U i }} Where N denote a set of nodes, N = {1,2, n}, S i = set of strategies or actions for player i S = S 1 S 2 S 3 S n is the Cartesian product of the sets of strategies available to each player {U i } = {U 1, U 2,,U n } is the set of utility functions that each player i wishes to maximize, where U i : S R. 17
18 The Game Model CONT D For every player i, the utility function is a function of the strategy chosen by player i, i.e s i, and those chosen by other players in the game, denoted as s i Together, s i and s i make up the action or strategy tuple S(s i, s -i ). A strategy tuple is a unique choice of actions by each player 18
19 The Game Model CONT D Best Response Strategy (BSR) of a player is a strategy that maximizes her utility function, given the strategies being played by others. Symbolically, S is the best response by player i to S i if S { arg max U i (s i, s -i ) } 19
20 The Game Model CONT D 20 A Nash equilibrium (NE) is an action tuple that corresponds to the mutual best response, i.e for each player i, the action selected is a best response to the actions of all others. In other words, a NE is an strategy tuple where no individual player can benefit from unilateral deviation S* = (s 1 *, s 2 *,..., s* n ) is a NE if U i (s* i, s* -i ) >= U i (s i, s* -i ) s i S i and i N
21 The Game Model CONT D An outcome is Pareto optimal if there is no other outcome that makes every player at least as well off while making at least a player better off. Symbolically, an action tuple S = (s 1, s 2, s 3,...,s n ) is Pareto optimal if and only if there exists no other action tuple A = (a 1, a 2, a 3,...,a n ) such that u i (A) u i (S) for i N. 21
22 The Strategy Model 22 A Model Not all nodes are bad, neither are all good. Large proportion are good while a few are bad. Our Aim: Using a good strategy of play, we want to neutralize the effect of misbehaving node(s) Typical Scenario
23 The Strategy Model CONT D Multi-Strategies Formulation Our game mechanism depends on formulation of strategy list: {S 0,S 1,S 2... S n } And their corresponding dynamic equilibria points: {E 0, E 1,E 2... E n } (we suppose the exist) If we denotes the order pair (S 0, E 0 ) as the default strategy (the normal form of DCF) 23
24 The Strategy Model CONT D 24 Then Alternative strategies and their equilibria are denoted as ordered pairs (S 1, E 1 ), (S 2, E 2 ),..., (S n, E n ) which represent some variants (i.e deviations from) of the standard strategy and their corresponding alternative equilibria points. Then, in the absence of a misbehaving node, all nodes will be playing (S 0,E 0 ), the normal DCF which is Pareto efficient
25 The Strategy Model CONT D 25 However, If a number of nodes behaves selfishly, the effect will be felt by other nodes in the sense that it will lead to transmission failure and hence lowers their utility. The affected nodes will react to this situation by incrementing k, an integer representing the number of failed attempt, initially k=0, k=k+1 and CW=CW 0 / k. This give rise to CW 1 = CW 0 / 1, CW 2 = CW 0 / 2... CW n = CW 0 / n.
26 The Strategy Model CONT D When a threshold n is reached, the variable k is decremented progressively back to 1 and the CW is calculated for each value of k and then used instead of CW 0 for the medium access CW = CW 0 / k, (k= 1 n, k++), (k= n 1, k--) => CW = CW 0 / 1, CW 0 / 2, CW 0 / 3... CW 0 / n, CW 0 / n, CW 0 / (n-1), CW 0 / (n-2), CW 0 / (n-3) CW 0 / n-(n-1) 26
27 The Default Tit for Tat Strategy 27 Be Nice cooperate, do not be the first to defect Do, what the others did last, cooperate if they cooperate and defect if they defect. Analysis of the TFT shows that it is vulnerable to deadlock scenario Previous Improvement on TFT includes: TF2T, GTFT, TFTWPr, TFTFWB We are proposing (PTFT) Progressive TFT with Exit, Strategy
28 28 Our Proposal: Progressive Tit For Tat (PTFT)
29 Initial Simulation Result CONT D Comparison of the cheater s strategy with our PTFT 29
30 Initial Simulation Result CONT D Comparison of the cheater s strategy with our PTFT 30
31 Initial Simulation Result CONT D Comparison of the 3 common strategies with our PTFT 31
32 Initial Simulation Result CONT D Comparison of the 3 common strategies with our PTFT 32
33 REFERENCES 33 [1] M. Cagalj, S. et al, On selfish behaviour in csma /ca networks," in INFOCOM th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4. IEEE, 2005, pp. 2513{2524}. [2] S. Boyer et al, A novel reputation-based tit-for-tat strategy for IEEE csma/ca protocol," in Consumer Communications and Networking Conference (CCNC), 2012 IEEE. IEEE, 2012, pp. 143{148}. [3] L. Chen et al, Selfishness Not always a nightmare: Modelling selfish mac behaviours in wireless mobile ad hoc networks," in Distributed Computing Systems, ICDCS '07. 27th International Conference on, June 2007, pp. 16{16}. [4] S. Shivshankar et al, Effect of altruism and punishment on selfish behaviour for cooperation in vehicular networks," in Communications in China (ICCC), st IEEE International Conference on. IEEE, 2012, pp. 653{658}. [5] S.Boyer et al, An adaptive tit{for{tat strategy for ieee csma/ca protocol," International Journal of Security and Networks, vol. 7, no. 2, pp. 95{106, [6] M. Seredynski et al, The necessity for strong reciprocators in mobile ad hoc networks," in Parallel and Distributed Processing Symposium Workshops PhD Forum (IPDPSW), 2012 IEEE 26th International, May 2012, pp. 609{616}.
34 QUESTION TIME Questions? Yes, Please. Anwers? Not Guarranted 34 Game Over!!! Thank you.
A Dynamic Reputation Management System for Mobile Ad Hoc Networks
A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric Chiejina School of Computer Science University of Hertfordshire Hatfield, UK e.chiejina@herts.ac.uk Hannan Xiao School of Computer
More informationSelfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
More informationA Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
More informationNetwork Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationSimple Channel-Change Games for Spectrum- Agile Wireless Networks
Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA
More informationTowards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationWireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
More informationECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY 100-3 90-99 21 80-89 14 70-79 4 0-69 11
The distribution of grades was as follows. ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY Range Numbers 100-3 90-99 21 80-89 14 70-79 4 0-69 11 Question 1: 30 points Games
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationEnhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationMulti-radio Channel Allocation in Multi-hop Wireless Networks
1 Multi-radio Channel Allocation in Multi-hop Wireless Networks Lin Gao, Student Member, IEEE, Xinbing Wang, Member, IEEE, and Youyun Xu, Member, IEEE, Abstract Channel allocation was extensively investigated
More information6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationIntrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
More informationPerformance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks
www.ijcsi.org 79 Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks Abeer Ghandar 1, Eman Shabaan 2 and Zaky Fayed 3 1 Computer Systems Department, Faculty of Computer
More informationDetection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras
TECHNICAL RESEARCH REPORT Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks by Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras SEIL TR 2004-4 (ISR TR 2004-30) I R INSTITUTE FOR
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationMultiagent Reputation Management to Achieve Robust Software Using Redundancy
Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationTHIRD-GENERATION (3G) wide-area wireless networks
1020 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Market Sharing Games Applied to Content Distribution in Ad Hoc Networks Michel X. Goemans, Li (Erran) Li, Vahab S. Mirrokni,
More informationCompact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
More informationPriority Based Load Balancing in a Self-Interested P2P Network
Priority Based Load Balancing in a Self-Interested P2P Network Xuan ZHOU and Wolfgang NEJDL L3S Research Center Expo Plaza 1, 30539 Hanover, Germany {zhou,nejdl}@l3s.de Abstract. A fundamental issue in
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.
1 ECON 40050 Game Theory Exam 1 - Answer Key Instructions: 1) You may use a pen or pencil, a hand-held nonprogrammable calculator, and a ruler. No other materials may be at or near your desk. Books, coats,
More informationKeywords: WMSN, MCC, NIST
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cheating Proof
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationIII. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More informationGame Theory Based Load Balanced Job Allocation in Distributed Systems
in Distributed Systems Anthony T. Chronopoulos Department of Computer Science University of Texas at San Antonio San Antonio, TX, USA atc@cs.utsa.edu Load balancing: problem formulation Load balancing
More information0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text)
September 2 Exercises: Problem 2 (p. 21) Efficiency: p. 28-29: 1, 4, 5, 6 0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text) We discuss here a notion of efficiency that is rooted in the individual preferences
More informationHLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, aejazkmlpr@gmail.com
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationChapter 13: Strategic Decision Making in Oligopoly Markets
Learning Objectives After reading Chapter 13 and working the problems for Chapter 13 in the textbook and in this Workbook, you should be able to do the following things For simultaneous decisions: Explain
More informationCoping with Spoofed PS-Poll Based DoS Attack in IEEE 802.11 Networks
57 Coping with Spoofed PS-Poll Based DoS Attack in IEEE 802.11 Networks Hocine Souilah Laboratory of Modelling and Optimization of Systems Faculty of exact science, University of Bejaia, Algeria hocinesouilah@gmail.com
More informationDetecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationWiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
More information6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
More informationDifferenciated Bandwidth Allocation in P2P Layered Streaming
Differenciated Bandwidth Allocation in P2P Layered Streaming Abbas Bradai, Toufik Ahmed CNRS-LaBRI University of Bordeaux- 5, Cours de la libération. Talence, 45 {bradai, tad} @labri.fr Abstract There
More informationSummary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationOligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.
Topic 8 Chapter 13 Oligopoly and Monopolistic Competition Econ 203 Topic 8 page 1 Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationSecurity Games in Online Advertising: Can Ads Help Secure the Web?
Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationGame Theory 1. Introduction
Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each
More informationSEMANTIC REPRESENTATION TO ANALYZE MISBEHAVIOR APPROACH OF NODES IN MANET
SEMANTIC REPRESENTATION TO ANALYZE MISBEHAVIOR APPROACH OF NODES IN MANET AAROHI SURYA LNMIIT, Computer Science Department, Jaipur, India E-mail: aarohisurya@gmail.com Abstract- The security approach mainly
More informationModelling Stakeholders Behaviour in Transport Pricing
Modelling Stakeholders Behaviour in Transport Pricing Erik-Sander Smits *^, Michiel Bliemer *#, Erik Verhoef +, Bart van Arem * -Extended abstract- * : Delft University of Technology Faculty of Civil Engineering
More informationIntrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus ska@unipi.gr Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
More informationGame Theoretic Methods for the Smart Grid
Game Theoretic Methods for the Smart Grid Walid Saad 1, Zhu Han 2, H. Vincent Poor 3, and Tamer Başar 4 1 Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL, USA, email:
More information9.916 Altruism and Cooperation
9.916 Altruism and Cooperation Today s Lecture I give everyone $10 Anonymous pairs Chance to send $0-$10 Anything you send, x3 How much do you send Puzzle of altruism: How could it evolve free-riders should
More informationAN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationPrice competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
ECON9 (Spring 0) & 350 (Tutorial ) Chapter Monopolistic Competition and Oligopoly (Part ) Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationPerformance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationA Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationTrust, Reputation and Fairness in Online Auctions
Trust, Reputation and Fairness in Online Auctions Adam Wierzbicki 21/11/2006 Polish-Japanese Institute of Information Technology Plan of the talk Background Online auctions Trust management Reputation
More informationOptimal Replacement of Underground Distribution Cables
1 Optimal Replacement of Underground Distribution Cables Jeremy A. Bloom, Member, IEEE, Charles Feinstein, and Peter Morris Abstract This paper presents a general decision model that enables utilities
More informationEntropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
More informationGames Manipulators Play
Games Manipulators Play Umberto Grandi Department of Mathematics University of Padova 23 January 2014 [Joint work with Edith Elkind, Francesca Rossi and Arkadii Slinko] Gibbard-Satterthwaite Theorem All
More informationTowards Incentive-Compatible Reputation Management
Towards Incentive-Compatible Reputation Management Radu Jurca and Boi Faltings Artificial Intelligence Laboratory (LIA), Computer Science Department, Swiss Federal Institute of Technology (EPFL) CH-115
More informationVampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
More informationThroughput Modeling in IEEE 802.11 WLAN-based Wireless Networks
Throughput Modeling in IEEE 82.11 WLAN-based Wireless Networks Kirill Ermolov Aalto University Espoo, Finland kirill.ermolov@aalto.fi Abstract Wireless Local Area Networks (WLANs) are nowadays the most
More informationPROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationMDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1
MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks Motorola Inc. Mesh Research and Development Group Maitland, FL 375 Hrishikesh.Gossain@motorola.com Hrishikesh Gossain, Carlos Cordeiro
More informationA Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
More informationAN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationPhysical Layer Security in Wireless Communications
Physical Layer Security in Wireless Communications Dr. Zheng Chang Department of Mathematical Information Technology zheng.chang@jyu.fi Outline Fundamentals of Physical Layer Security (PLS) Coding for
More informationOn the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationA game-theoretic intrusion detection model for mobile ad hoc networks
Available online at www.sciencedirect.com Computer Communications 31 (2008) 708 721 www.elsevier.com/locate/comcom A game-theoretic intrusion detection model for mobile ad hoc networks Hadi Otrok *, Noman
More informationA Dynamic Reputation Management System for Mobile Ad Hoc Networks
Computers 2015, 4, 87-112; doi:10.3390/computers4020087 OPEN ACCESS computers ISSN 2073-431X www.mdpi.com/journal/computers Article A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationGame Theory & Oligopoly Market. Decision making environments may be classified into four types:-
Game Theory & Oligopoly Market Prof. Rupesh R. Dahake. DMIETR, Wardha. Introduction:- Today this competitive business environment effective decision making play a vital role in such competitive business
More informationNetwork Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
More informationBRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
More informationADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More information