A Self-Adaptive Detection System for MAC Misbehavior in Ad Hoc Networks Lei Guang and Chadi Assi Concordia Institute for Information System Engineering Concordia University Montr´eal, Qu´ebec, Canada Email: {l guang, assi}@ciise.concordia.ca

Abstract— MAC layer misbehavior due to selfish or malicious reasons can significantly degrade the performance of mobile adhoc networks. Currently, detection systems for handling selfish misbehavior has been proposed and studied. In this paper we study a new class of malicious misbehaviors that causes transmission timeout of MAC frames at either the transmitter side or the receiver side. A misbehaving node fully cooperates by forwarding packets for other nodes and completely adheres to the proper selection of backoff intervals; however, it maliciously forces the forwarding operation to fail in order to either disrupt the route discovery process or cause damage to the existing flows routed through itself. We design and implement a new detection system that identifies the malicious nodes through a set of monitoring and reaction procedures. Once a misbehaving node is detected, the system reacts, by adapting simple protocol parameters, to mitigate the negative effects. We describe the detection system and the different reaction procedures for different misbehaviors. We evaluate through network simulation the effectiveness of the system in detecting malicious nodes and improving the network performance.

I. I NTRODUCTION Lately, significant research efforts have focused on improving the security of ad hoc networks. In mobile ad hoc networks (MANET), nodes are both routers and terminals and due to the lack of a routing infrastructure these nodes have to cooperate to ensure successful communication. Clearly, cooperation means ensuring correct routing establishment mechanisms, the protection of routing information and the security of packet forwarding [7], [10]. One major challenge that was neglected previously by the research community is that of securing against MAC layer misbehaviors. Host misbehaviors in MANET can be classified into two categories; namely, selfish misbehavior [8] and malicious misbehavior [2]. Selfish hosts typically misbehave to improve their own performance; this includes hosts that refuse to forward packets on behalf of other hosts in order to conserve energy. Greedy hosts may exploit the vulnerabilities of IEEE 802.11 [1] to increase their share of bandwidth at the expense of other users. For example, IEEE 802.11 requires hosts competing for the channel to wait for backoff interval [8] before any transmissions. A selfish host may also choose to wait for a smaller backoff interval, thereby increasing its chance of accessing the channel and hence reducing the throughput share received by well-behaved users. The authors of [8] showed that such selfish misbehavior can seriously

degrade the performance of the network and accordingly they proposed some modifications for the protocol (e.g., by allowing the receiver to assign backoff values rather than the sender) to detect and penalize misbehaving nodes. Similarly, the authors of [11] addressed the same problem and proposed a system, DOMINO, to detect greedy misbehavior and backoff manipulations of IEEE 802.11. Alternatively, malicious misbehavior aims primarily at disrupting the normal operation of the network [6]. This includes colluding adversaries that continuously send data to each other in order to deplete the channel capacity in their vicinity (i.e., causing a denial of service attack, DoS) and hence prevent other legitimate users from communicating [12]. Another example of malicious misbehaviors is the JellyFish [2] which targets closed-loop flows (such as TCP) that are responsive to network conditions (e.g., delays and loss). Although JF conforms to all routing and forwarding operations, it is capable of reducing the goodput of all traversing flows to near zero while dropping zero or very small fraction of packets. A new class of vulnerabilities was presented in [5] where a host could maliciously modify the protocol timeout mechanism (e.g. by changing SIFS value in 802.11) and cause MAC frames to be dropped at well-behaved nodes. A host exploiting this vulnerability will completely cooperate in forwarding data packets but maliciously forces the forwarding operation to fail. This attack mainly targets the route discovery process in order to cause packets to be routed through longer routes and hence consume more network resources. Moreover, the attack also targets crossing flows (flows that traverse through a malicious node) by disrupting their communication and forcing the routing protocol to reroute packets around the misbehaved node. Detection and prevention systems previously designed to deal with MAC layer misbehaviors, such as DOMINO [11], or network layer misbehaviors, such as Watchdog and path rater [9] , are incapable of coping with this attack. In this paper, we present a system that is capable of detecting and reacting to this malicious misbehavior and could be a complementary tool for detection systems such as DOMINO and Watchdog. The rest of this paper is organized as follows: Section II elaborates the timeout attack problem. Section III describes the details of our detection schemes. Section IV evaluates the proposed approach through simulation experiments. Finally conclusions are presented in section V.

II. T HE P ROBLEM Recall that in order to prioritize access to the wireless medium, DCF defines three time windows (SIFS, DIFS, and EIFS), only the first two are important for the purpose of our discussions. Prior to the transmission of any frame, a node must observe a quiet medium for one of the defined window periods. The short interframe space (SIFS) is used for frames sent as part of preexisting frame exchange (e.g., CTS or ACK frames sent in response to previously transmitted RTS or DATA frames). DCF Interframe Space (DIFS) is used for nodes wishing to initiate a new frame exchange. After the channel is sensed idle for a DIFS time, a node waits for an additional backoff time after which the frame is transmitted. To completely manipulate the channel, a node could transmit a signal after a short SIFS [3] and to achieve a notable increase in the bandwidth a node could transmit after SIFS but before DIFS when the channel is idle [12]. However, as shown in [5], there are far other consequences resulting from selecting different values for SIFS. To elaborate, note that whenever a node has a packet to transmit it will sense the medium to be free for a duration of DIFS. If the channel is sensed busy, the sender defers its transmission by running its backoff algorithm. If the medium is idle for a DIFS period, it then performs an RTS/CTS exchange before the actual data transmission to reserve the shared medium in order to reduce the high probability of collision. After a successful transmission of DATA, the receiver sends ACK back to the sender. When the Src1 sends a RTS, it also computes a CTS timeout (T OCT S ), an interval during which the sender expects a CTS from the Dst. If the CTS does not arrive within the time out period, then the Src infers that a collision has occurred (e.g., hidden terminal problem) at the Dst side and schedules a new RTS transmission. T OCT S = TRT S + 2δ + sif s + TCT S

(1)

Where, TRT S , TCT S are the transmission time of RTS and CTS frames correspondingly and δ is the maximum propagation delay. Similarly, when the Dst transmits a CTS, it computes a DATA timeout (T ODAT A ), a period during which it expects a DATA packet from the Src. If the DATA does not arrive within this period, the Dst infers that the Src did not receive the CTS. T ODAT A = TCT S + 2δ − 2 × sif s + rf + TACK

(2)

Where TACK is the transmission time of an ACK frame and rf is the duration field sent in the RTS frame. rf = sif s + TCT S + sif s + TDAT A + sif s + TACK

(3)

1 In a single handshaking process, a node will play two different roles, i.e. transmitter or receiver. To avoid confusion in the following sections, we use Src (Dst) to refer to the source (destination) of a MAC DATA frame. Moreover, Tx is refereed when a station transmitts any MAC frame, i.e, RTS/CTS/DATA/ACK. Rx is refereed when a station receives any MAC frame..

TDAT A is the transmission time of the DATA frame. Now, when the Src transmits a DATA frame, it computes an ACK timeout interval, after which if no ACK is received from the Dst, then the Src concludes that the DATA frame transmission failed and subsequently it invokes its backoff procedure and schedules a new retransmission of DATA. T OACK = TDAT A + 2δ + sif s + TACK

(4)

Observe that a malicious Dst that selects a larger SIFS value (sif s∗ , larger than the nominal value, e.g., sif s plus 10% of one slot time) deliberately delays the arrival of the CTS/ACK until its corresponding timeout has expired at the Src. Therefore, the Src is forced to timeout every time it transmits either an RTS frame or a DATA frame. After successive unsuccessful retransmissions, the Src will drop the data packet and report a link breakage to the network layer. Here, detection systems like watchdog2 [9] will fail to detect this malicious misbehavior since the malicious node (Tx in this case) is sending CTS or ACK frames, however they arrive after their corresponding timeout timers at the sender expire. Malicious nodes of this category aim primarily at disrupting the route discovery process from discovering routes through them; therefore forcing packets of other hosts to go through non optimal routes. As a consequence, such a node will conserve its battery power by refusing to forward packets of no direct interest to the node. Moreover, since flows are forced away, such a malicious node can access the medium with less contention and hence achieves a larger throughput share of the wireless channel without modifying its backoff interval. Similarly, a Src that intentially selects a smaller SIFS value (sif s∗ , smaller than the nominal value, sif s minus 10% of one slot time [1]) will timeout before the CTS/DATA arrives back from the Dst. Like before, after successive unsuccessful attempts, the malicious Src drops the packet and report the link breakage to the routing layer. In [5] we have detailed this analysis, and we summarize here the conclusions of the case studies. Generally, the attack is effective under two cases [5]: (I) sif s − sif s∗ ≥ 2us and the Rx is misbehaved. (II) sif s∗ − sif s ≥ 2us and the Tx is misbehaved. As mentioned earlier, this malicious behavior aims at (1) disrupting the route discovery process and (2) interrupting the crossing flows and forcing packets to be rerouted around the malicious nodes. In addition, this category of misbehavior relies on modifying the timeout operation of IEEE802.11 protocol by failing to follow communication procedures or changing pre-defined parameters in the standard. An example is that a misbehaved Dst can transmit CTS after DIFS/EIFS instead of SIFS without any change of the standard parameters. We will refer to this attack throughout the paper as the TO (TimeOut) attack. 2 We assume that a watchdog system is capable of monitoring the link layer communication.

TO_CTS

Recv RTS

CT

) S(4

CT S(1 )

RT

) S(3

RTS_seq(Tx) ++

)

S (2

)

S (1

RT

RT

RT

S(2 )

TO_CTS*

Node M

Node R TO_DATA

sifs

Fig. 1.

No

TO_DATA(Tx) expires

Attack Case: Misbehaved Rx

Yes

BadCredit (+)

BadCredit (++)

TO _C TS

) K (1 AC

S(1

)

)

S (1

( 1) TA DA

RT

CT

N ode M

sifs*

TO _C TS*

No BadCredit > Threshold

N ode R ’ sifs’

TO _D A TA ’ Yes

Fig. 2.

Detect and First React: Misbehaved Rx

Rx is Suspect 1st Reaction

III. P ROCEDURES FOR D ETECTION We have seen that TO attack can take effect when either the transmitter or the receiver misbehaves. Therefore, detection schemes should be implemented for a transmitter (Case (I), i.e., misbehaved receiver) or a receiver (Case (II), i.e., misbehaved transmitter) respectively. We only consider four-way handshaking procedure in the following discussions. The same detection schemes can be applied to the two-way handshaking procedure as well. A. Detection Function for a Well-behaved Transmitter 1) Suspect identification: When a node R (Dst) receives a RTS frame from M (malicious node), it increments the value of RT S seq(src) (RT S seq(src) is used by R to record the number of consecutively received RTS frames from M for a single DATA frame). If R receives the first RTS from M, i.e., RT S seq(src) = 1, it will send back a CTS after waiting for a sif s time interval. Meanwhile, R computes a T ODAT A , a timeout interval during which it expects to receive the DATA from M (see Fig. 1). Note that since M is a misbehaved ∗ node, its CTS timeout T OCT S is computed to a smaller value ∗ ∗ using sif s (sif s is less than the nominal value sif s used by a well-behaved node, e.g., node R). Therefore, node M receives the CTS from R upon the expiration of its timeout timer (see Fig. 1); M will accordingly drop the received CTS and send the second RTS after appropriate deferral interval. When node R receives the second RTS for the same DATA frame, R does not know whether its previous CTS was lost because (a) M is a malicious node, or (b) M is the victim of an attack from a third node that intentionally transmits frames at the same time R sends its CTS, or further (c) whether M is under another attack from colluding nodes transmitting data flows in the vicinity of R. All these possibilities indicate that M is not trustworthy for a reliable communication (albeit M may itself be a victim). We distinguish between two cases; (1) node R may receive subsequent RTS during the data timeout, T ODAT A , or (2) after the timeout. Node R also maintains a parameter (badCredit) to evaluate the trustworthiness of every node that it communicates with (or every node that

Send CTS

Fig. 3.

Detection Function for a Well-behaved Transmitter

communicates with R). When the second RTS arrives at node R during T ODAT A , it is more likely that node M is misbehaving (since its T OCT S has expired earlier than it should) and hence R will punish node M by increasing its badCredit parameter heavily3 (e.g., by increasing or adding a constant, or even doubling its value). Alternatively, if the second RTS arrives after the T ODAT A , then it is more likely that node M is a victim of an attack of type (b) or (c); In this case, node R will only increase the badCredit value of M slightly since node M is still not reliable. Once the badCredit reaches a certain creditT hreshold, M becomes a suspect and R will call the adjustment scheme to react for the first time. The value of creditT hreshold does not need to be high enough; a small value (e.g. 5) can be used to quickly indicate whether a node is deviating from the normal operation (see Fig. 3 for the operation of the system). 2) Adjusting timeout: The adjustment scheme is used to ensure correct misbehavior diagnosis by node R. Once node M is designated as a suspect, then node R will react by expediting the transmission of CTS. That is, node R will adjust its sif s to a smaller value sif s0 (e.g., use a sif s of 2us if 10us is used as the nominal value), as shown in Fig. 2. Note that when node 0 R selects a smaller sif s0 , T ODAT A increases (see Equation (2)) and hence the chances that the DATA packet arrives at node R within the timeout would be higher. After sending the CTS, R will watch the reaction of M. Note that choosing a smaller sif s0 than sif s∗ will cause no TO attack. From equation (2), R will compute a larger 0 0 ∗ ∗ 0 T ODAT A , i.e., (T ODAT A − T ODAT A ) = 2(sif s − sif s ). It means that the data timeout interval is extended. Therefore no TO attack will happen as shown in Fig. 2. 3 See Fig. 3, (++) designates a heavy increase in the bad Credit, e.g., increase by 2, and (+) designates a light increase of bad credit, e.g. increase by 1.

TO _CTS

Recv CTS RT )

)

CT

S( 2

S( 1

S (1

RT

)

Node S

CTS_seq(Rx) ++ Node M sifs sifs*

Fig. 4.

TO _DATA*

No

Attack Case: Misbehaved Tx

TO_CTS(Rx) expires

Yes

sifs’ BadCredit (++)

CT S(

(1) TA DA

) S(1 RT

1)

Node S

TO_CTS’ TO_CTS

No

Node M sifs sifs*

BadCredit > Threshold

TO_DATA** Yes

Fig. 5.

Detect and First React: Misbehaved Tx

3) Handling misbehavior: Upon transmitting a CTS with adjusted smaller sif s value, if node R receives the DATA packet from node M, then this indicates that (1) either node M is no longer under attack, or (2) node M is not aware of the detection system implemented by R, or (3) M is aware but is avoiding degrading further its trust level. In the second case, when M receives a CTS from R during the timeout, according to the specifications, it must transmit the DATA packet. In the third case, the node tries to avoid being isolated from the network if its trust level falls below a threshold. In all cases, the communication will successfully continue through node M. Alternatively, if node R does not receive the DATA packet after reacting to the suspect node, this indicates that node M may have detected the reaction of R and have adjusted further its sif s∗ value or may be intentionally dropping the received CTS or may still be under attack. In all cases, node M is not reliable for any future communication. At this point, the trust level of node M is reduced by node R. This monitoring and reacting process continues for a pre-set monitoring period until the trust level of node M falls below a trust level threshold and node R invokes its second reaction scheme as explained later. B. Detection Function for a Well-behaved Receiver 1) Suspect identification: When node S has a data packet to transmit, it will send a RTS frame to node M (Fig. 4). Accordingly, S increases the RT S seq(dst) counter to record the number of consecutively transmitted RTS frame to the destination for the same DATA frame. S then computes T OCT S , a timer indicating the maximum timeout interval S expects to receive back the CTS frame from M. If M is wellbehaved, it will send back a CTS if the medium is free upon the reception of a RTS frame. If M is misbehaving, it will delay the transmission of CTS by increasing its own SIFS value to sif s∗ (sif s∗ is larger than the nominal value sif s used by a well-behaved node, e.g., node S). Therefore, on the Tx side, node S will wait for the CTS frame until the expiration of T OCT S timer. After the timer expires, S will defer and schedule a retransmission for RTS.

Tx is Suspect 1st Reaction

Send DATA

Fig. 6.

Detection Function for a Well-behaved Receiver

There are two different scenarios that can be distinguished: 1) the CTS frame from M arrives during the deferring period; 2) the CTS frame does not arrive even when the deferring period has finished. For the former scenario, it means that M has delayed the CTS by slightly increasing its sif s∗ , and hence causing the CTS to be dropped by S because T OCT S has expired. In this case, S will increase the counter CT S seq(src) to indicate the number of delayed CTS frames arriving from M. And S will punish M by increasing its badCredit, e.g. by 2, since this is an obvious abnormal transmission. Alternatively, if the CTS does not arrive during the deferring period, then either node M has selected a larger sif s∗ or node M has its NAV indicating a busy medium. In both cases, S will slightly increase the badCredit for the receiver M. Once the badCredit is above the chosen creditT hreshold, M becomes a suspect and the first reaction scheme will be called by S. Again notice that the creditT hreshold does not necessarily have to be high enough to ensure the correct diagnosis. It is mainly used to invoke the adjustment scheme (see Fig. 6 for the operation of the system). 2) Adjusting timeout: When node M is identified as a suspect, node S will trigger its first reaction by increasing 0 0 its T OCT S , e.g., by incrementing the value of sif s to sif s 0 (sif s is larger than the nominal value of sif s), as shown in Fig. 5. This is to circumvent the misbehavior of node M by increasing the CTS time out. 3) Handling misbehavior: Upon the transmission of an adjusted MAC frame (e.g., RTS frame), if S receives the CTS 0 from M within the newly adjusted T OCT S , then this indicates that (1) either node M is no longer misbehaving (i.e., CTS 0 arrives within T OCT S ), or (2) it is not aware of the reaction scheme of S, or (3) it silently follows the adjustment to avoid degradation of its trust level. As a result, S will send back the DATA frame. If the CTS is still delayed, it indicates that S

100

Correct Detection Misdetection

Percentage (%)

80

60

40

20

0 0

10

Fig. 7.

20 30 Percentage of misbehaving nodes (%)

40

50

Accuracy of Detection

100 creditThreshold = 3 creditThreshold = 5 creditThreshold = 7 creditThreshold = 9 80

Misdetection (%)

does not choose a sif s0 larger than sif s∗ for the first reaction and hence the adjustment might take several stages. Note that, node S cannot keep on increasing its sif s0 value and an upper limit is defined, sif smax . Every time S reacts by increasing sif s0 , it updates the badCredit parameter for node M. In addition, instead of changing sif s, node S can simply adjust its T OCT S until T OCT S hits the defined upper limit. Furthermore, note that choosing a larger sif s0 value by node S (sif s0 > sif s∗ ) does not consider an attack. That is, a 0 0 larger sif s0 yields a larger T OCT S > T OCT S and rf > rf . ∗∗ At the receiver side, node M will compute T ODAT A based ∗∗ ∗ 0 on equation (2). Hence, T ODAT A − T ODAT A = 3(sif s − sif s) > 0. That means data timeout interval is extended at the receiver M as shown in Fig. 5. Therefore, no TO attack will happen. Similar to A. 3), after M receives the DATA, it will either receive the DATA and send back an ACK or continue to drop the DATA. For the former case, the communication will work at the cost of increased packet delay. And S will give M a slightly decreased trust level. For the latter case, M will end up with a heavily decreased trust level and get punished. As mentioned before, we use the trust level as a long term monitor parameter to watch the behavior of a node and invoke the second reaction schemes (not mentioned in this paper).

60

40

20

0 0

Fig. 8.

10

20 30 Percentage of misbehaving nodes (%)

40

50

creditThreshold Effect on the misdiagnosis

IV. S IMULATION AND A NALYSIS In order to evaluate the performance of our proposed approach, we use ns2 [4] to simulate our detection and reaction system. As the detection function for a well-behaved Tx is similar to the detection function for a well-behaved Rx, in this section we only focus on examining in details of the detection function for a well-behaved Tx. A. Simulation Setup Simulation Topology: The topology of this experiment is a grid network of 7 × 7 nodes. The grid unit is 100m. There are 49 nodes that are positioned on the grid. All the nodes are fixed. The transmission range for each node is 250m and the carrier sense range is 550m. There are 8 flows across the grid topology. The traffic type from the source to the destination is CBR. The packet size is 512 bytes/packet and the data rate is 4 packets/second. Note that the traffic load is low. The channel bit rate is 2Bps. Ad-hoc On-demand Distance Vector protocol (AODV) is used as the routing protocol. The total simulation time is 100 seconds. To model a misbehaved Rx, we set the malicious node (Src, see Fig. 1) sif s∗ to 7us whereas sif s for a well-behaved node is 10us. The detection parameter creditT hreshold is used to identify a suspect. In order to allow fast identification of a misbehaved node, we choose a relatively smaller value 3. In the presence of a suspect, a well-behaved node will invoke the first reaction by reducing its timeout interval, (e.g. adjusting its sif s to sif s0 ). This adjustment can take several stages until finally the sif s0 of this node reaches to a lower bound. For simplicity, upon identification of a suspect, a wellbehaved node will immediately adjust its sif s0 to 2us for the

data exchange with the suspect node. Moreover, as we do not consider a suspect refusing to obey the first reaction, trust level based second reaction will not be discussed in this section. Simulation Metrics: We use the following metrics to study the performance of our proposed approach: • Correct Detection: ratio of the number of misbehaved nodes that are correctly marked by the detection system as suspects to the total number of active misbehaved nodes in the network; • Misdetection: ratio of the number of well-behaved nodes that are incorrectly diagnosed as suspects to the total number of well-behaved nodes in the network; • Packet Delivery Ratio: ratio of the data packets successfully delivered to the destination to those generated by the source; • Average Packet Delay: average end-to-end delay for each successfully delivered data packet, which includes all the possible delays caused by route buffering, MAC interface queue, retransmission delays. B. Results Diagnosis Accuracy: Fig.7 shows the correct detection and misdetection percentage under different percentage of misbehaving nodes (MN%) and the results are averaged over 10 runs. As the figure shows, the correct detection ratio is 100% which means our approach is successful in recognizing all the misbehaved nodes as suspect nodes. On the other hand, we observe a relatively high misdetection ratio, i.e., 20%. Recall that a well-behaved node can be misdiagnosed due to successive frame retransmissions caused by colli-

V. C ONCLUSION MAC layer misbehavior can lead to severe performance degradation in MANET. Current work has mainly concentrated on handling MAC selfish misbehaviors and detection systems have been proposed. Detection and reaction against malicious MAC misbehaviors, however, is still relatively unexplored. In this paper, we have presented a new type of malicious behavior (TO attack) and provided the corresponding detection and reaction schemes. Rather than just correctly identifying the misbehaved nodes, we have developed a two-stage reaction (first reaction stage is to mitigate and second reaction stage is to punish) mechanism that can improve the network

1 attack detect normal 0.9

0.8

Delivery Ratio

0.7

0.6

0.5

0.4

0.3

0.2 0

10

20 30 Percentage of misbehaving nodes (%)

Fig. 9.

40

50

Packet Delivery Ratio

1 attack detect normal

0.9 0.8 0.7 Average Delay (second)

sions. Moreover, the misdetection is related to the use of creditT hreshold. In this test, we use a smaller threshold, e.g., 3, which allows reasonably fast misbehavior detection but at the cost of a higher misdetection. The Increment of the threshold value will reduce the misdetection ratio. In Fig. 8, we plot misdetection ratio for different creditT hreshold. Here we can find that the misdetection is decreased with the increment of the threshold at the cost of slow reaction towards misbehaved nodes. For example, the misdetection ratio is around 10% when creditT hreshold is 9. Here, notice that a well-behaved node which is misdiagnosed as a suspect will not be affected by the reaction mechanisms. For the first reaction scheme, a well-behaved node will continue its normal communication. For the second reaction scheme, a well-behaved node will never get a low trust level. Packet Delivery Ratio: Fig. 9 compares the delivery ratio versus MN% obtained under three cases: 1) no active misbehaved nodes (designated as normal); 2) misbehaved nodes are active (designated as attack); 3) misbehaved nodes are active while well-behaved nodes are using the proposed scheme (designated as detect). Each point on the graph is averaged over 5 runs. The misbehaved nodes are randomly selected. As seen from the figure, in the presence of misbehaved nodes the delivery ratio is decreased sharply (75% loss compared with the normal case) as MN% increases. This is due to the fact that routes will be broken under the attack and some flows may even not be able to find any available route [5]. In addition, the delivery ratio of network using the detection scheme is almost not affected, except that there is a slight decrement compared with normal case when MN% is close to 50%. Hence, the proposed first reaction scheme is fairly successful in ensuring normal data communication in a malicious environment. Packet Average Delay: Fig. 10 shows the average packet delay for the system with and without the detection and reaction scheme. It is clear that in both cases, the average delay will increase. For case that nodes implementing the detection system, the increased delay is because a well-behaved node needs to monitor the node behavior for a very short period to make a judgment. As long as the suspect is identified and handled with the first reaction scheme, its negative impact will be mitigated. As a result, the average delay is less than the attack case and comparable with normal case especially when MN% is low.

0.6 0.5 0.4 0.3 0.2 0.1 0 0

10

20 30 Percentage of misbehaving nodes (%)

Fig. 10.

40

50

Average Packet Delay

performance in the presence of misbehaved nodes. Through simulations, we have shown that our system achieves high accuracy in identifying misbehaved nodes. Moreover, we have also shown that the first reaction system is very effective in mitigating the misbehavior effect and improve the network performance (e.g., throughput and delays). R EFERENCES [1] IEEE802.11 wireless LAN media access control (MAC) and physical layer (PHY) specifications. 1999. [2] I. Aad, J. P. Hubaux, and E. W. Knightly. Denial of service resilience in ad hoc networks. In Proc. of ACM MobiCom, September 2004. [3] J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX, 2003. [4] K. Fall and K. Varadhan. NS notes and documentation. Technical report, UC Berkley, LBL, USC/ISI. In Xerox PARC, 2002. [5] L. Guang and C. Assi. On the resiliency of ad hoc networks to MAC layer misbehavior. In Workshop on PE-WASUN, ACM MsWiM, October 2005. [6] L. Guang and C. Assi. Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In IEEE/ACM WiMob, August 2005. [7] Y.-C. Hu and A. Perrig. A survey of secure wireless ad hoc routing. IEEE Security & Privacy, special issue on Making Wireless Work, May/June 2004. [8] P. Kyasanur and N. Vaidya. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing., September 2005. [9] S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, 2000. [10] P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In Proc. of CNDS, 2002. [11] M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots. In Proc. of ACM MobiSys, June 2004. [12] Y. Zhou, D. Wu, and S. Nettles. Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems. In Workshop on BWSA, BROADNETS, October 2004.

A Self-Adaptive Detection System for MAC Misbehavior ...

reasons can significantly degrade the performance of mobile ad- hoc networks. Currently, detection systems for handling selfish misbehavior has been proposed ...

89KB Sizes 1 Downloads 231 Views

Recommend Documents

A Piggyback System for Joint Entity Mention Detection ...
We release to the public the GERDAQ evaluation data- set for A2W. GERDAQ .... competition dataset, which consists of 800,000 queries. First we polished the ...

A Piggyback System for Joint Entity Mention Detection ...
in Tables 4 and 5 plus the number of features in Table 6, for a total of 96 features. ..... In comparison to the NE-annotation of the previous sec- tion, we notice that ...

Leak detection system
Sep 12, 1988 - a series of precisely-aligned and formed spiral grooves that cooperate with several parallel helical grooves formed in the stator. The use of the ...

Phishing Detection System
various features such as HTML Email, IP-based URL, no of domains used,age ... E. Classifying Phishing Emails Using Confidence-Weighted Linear Classifiers.

CT-MAC: A MAC Protocol for Underwater MIMO Based Network ...
tic networks. Although extensive research has been con- ducted at the physical layer for underwater MIMO commu- nications, the corresponding medium access control (MAC) is still largely ... derwater MIMO based network uplink communications. In. CT-MA

Intruder detection and warning system
(22) Filed: Feb. 4, 2010. (57). ABSTRACT. Related U's' Patent Documents. An intruder detection and warning system has a plurality of. Reissue 0ft infrared ...

Intruder detection and warning system
Feb 4, 2010 - 6,943,685 B2* 9/2005 Seo ............................. .. 340/541 ... (21) Appl- NO-1 12/700'241. (74) Attorney, Agent, or Firm 4 Bacon & Thomas, PLLC.

Motivation for a specialized MAC -
on the scheme, collisions may occur during the reservation period, the transmission period can then be accessed without collision. One basic scheme is demand assigned multiple access (DAMA) also called reservation. Aloha, a scheme typical for satelli

Author's personal copy The AEGIS detection system for ...
Matveev, F. Merkt, S. Moretto, C. Morhard, G. Nebbia, P. Nedelec, M.K. ... positronium and the antiproton cloud dimensions (of the order of a few mm) the pro-.

Revealing Method for the Intrusion Detection System
Detection System. M.Sadiq Ali Khan. Abstract—The goal of an Intrusion Detection is inadequate to detect errors and unusual activity on a network or on the hosts belonging to a local network .... present in both Windows and Unix operating systems. A

An intelligent real-time vision system for surface defect detection ...
challenging in real-time in a hot rolling process: (1) The ... sampling requires a data acquisition rate of 80 MB per .... Unlike traditional classifiers such as artificial ...

Feature Selection for Intrusion Detection System using ...
Key words: Security, Intrusion Detection System (IDS), Data mining, Euclidean distance, Machine Learning, Support ... As the growing research on data mining techniques has increased, feature selection has been used as an ..... [4] L. Han, "Using a Dy

A Scalable Wireless Intrusion Detection System
1, No. 1, May 2009. 53. A Scalable Wireless Intrusion Detection System. Mouhcine .... legitimate station or an access point to access network services.

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
a finished intelligent tool prototype for intrusion detection. Intrusion ..... They receive alerts from correlator agents, analyse ... Monitoring and Surveillance.

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
Therefore, JAVA language will be chosen for its .... the same time, a language and a knowledge base, also called .... php?action view=submenu&option=tree&id.

A Plagiarism Detection System in Computer Source Code - Ijcsra.org
International Journal of Computer Science Research and Application ..... She received her M.S. degree in Algorithms and Software Products (2007), Faculty of.

Multilayered Identity Crime Detection System
Keywords--- security, data mining based fraud detection, data stream mining, anomaly .... are similar in concept to credit transactional fraud detection in banking ... justifications and anatomy of the CD algorithm, followed by the SD algorithm.

Host based Attack Detection using System Calls
Apr 3, 2012 - This calls for better host based intrusion detection[1]. ... Intrusion detection is the process of monitoring the events occurring in a ... System Call in Linux ... Rootkits[2] are a set of software tools used by an attacker to gain.

Deadlock Detection & Deadlock Prevention of Distributed System
deadlock detection and prevention approaches for distributed database. ... aspects of distributed systems, they are harder to detect, avoid, and prevent.

of Misbehavior - Caldwell County Schools
For more information about Cheri and to get her book,. 21 Ways to Connect with Your Kids, visit CheriGregory.com. and what to do about them. 4Mistaken ...

[PDF BOOK] The Misbehavior of Markets: A Fractal ...
... his ideas and later translated Fractals Form Chance and A stock market equity market ... View of Financial Turbulence Full PDF, The Misbehavior of Markets: A Fractal ... (Mis)Behavior of Markets, Mandelbrot joins with science journalist and ...