2006
DOI: 10.1109/tnet.2006.886298
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Study of CSMA/CA Under a Backoff Attack

Abstract: Abstract-CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recently been found vulnerable to selfish backoff attacks consisting in nonstandard configuration of the constituent backoff scheme. Such attacks can greatly increase a selfish station's bandwidth share at the expense of honest stations applying a standard configuration. The paper investigates the distribution of bandwidth among anonymous network stations, some of which are selfish. A station's obtained bandwidth shar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
74
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(74 citation statements)
references
References 34 publications
0
74
0
Order By: Relevance
“…While the solution proposed in [23] requires the modification in the MAC layer of wireless nodes, the proposed approach in [25] can protect wireless users from selfish users without any change to the MAC protocol. With the same players, their actions are the selections of backoff configurations.…”
Section: ) Decentralized Access Methodmentioning
confidence: 99%
“…While the solution proposed in [23] requires the modification in the MAC layer of wireless nodes, the proposed approach in [25] can protect wireless users from selfish users without any change to the MAC protocol. With the same players, their actions are the selections of backoff configurations.…”
Section: ) Decentralized Access Methodmentioning
confidence: 99%
“…Much researcher has been performed on "fair queuing" algorithms for achieving a fair allocation of bandwidth on a shared link [3], [4]. Consider the system shown in figure 1, where a node maintains several queues which store packets to be transmitted on an output link.…”
Section: A Fair Queuing and Other Related Workmentioning
confidence: 99%
“…The GPS discipline cannot be accurately implemented in practice, since data transmitted in real network is packetized. There are several packet fair queuing algorithm which approximate GPS under the constraint that each packet must be transmitted as a whole [3], [4], [1], [5], [6].these protocol are centralized by nature, as noted above. There has been some work on achieving fairness using distributed MAC protocol for wireless network [7], [8].…”
Section: A Fair Queuing and Other Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it cannot be used in ad-hoc networks. Theoretical research pertaining to backoff attacks in ad-hoc networks has been published by Konorski (e.g., in [6]). A game theoretic approach is used to provide incentives for proper cooperation.…”
Section: The Ieee 80211 Standardmentioning
confidence: 99%