Skip to main content

Real-Time Misbehavior Detection in IEEE 802.11TM: An Analytical Approach

  • Chapter
  • First Online:
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 692 Accesses

Abstract

In this chapter, we address the selfish misbehavior in the IEEE 802.11TM based wireless network. After a brief description on selfish misbehavior in 802.11TM, we first design a real-time backoff misbehavior detector, termed as the fair share detector (FS detector), which exploits the non-parametric cumulative sum (CUSUM) test to quickly find a selfish malicious node without any a priori knowledge of the statistics of the selfish misbehavior. We then develop a Markov chain based analytical model to systematically study the performance of the FS detector. Based on the analytical model, we can quantitatively compute the system configuration parameters for guaranteed performance in terms of average false positive rate, average detection delay and missed detection ratio under a detection delay constraint. We present simulation results to confirm the accuracy of our theoretical analysis as well as demonstrate the performance of the FS detector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Without loss of generality, we can consider the situation that some nodes have a UDP flow and some have a TCP flow. If a node has both UDP flows and TCP flows, in a saturated situation, the aggregate traffic behaves similar to the UDP traffic.

References

  1. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.

    Google Scholar 

  2. B. Brodsky and B. Darkhovsky, Nonparametric Methods in Change-point Problems, Kluwer Academic Publisher, 1993.

    Google Scholar 

  3. C. E. Koksal, H. Kassab and H. Balakrishnan, “An Analysis of Short-Term Fairness in Wireless Media Access Protocols,” in Proc. ACM SIGMETRICS, 2000.

    Google Scholar 

  4. J. R. Morris, Markov Chains, Cambridge Univ. Press, 1997.

    Google Scholar 

  5. J. Tang, Y. Cheng, and W. Zhuang, “An Analytical Approach to Real-Time Misbehavior Detection in IEEE 802.11 Based Wireless Networks,” in Proc. IEEE INFOCOM, 2011.

    Google Scholar 

  6. The Network Simulator - ns-2, [Online.] Available: http://www.isi.edu/nsnam/ns/.

  7. A. Toledo and X. Wang, “Robust Detection of Selfish Misbehavior in Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124–1134, Aug. 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tang, J., Cheng, Y. (2013). Real-Time Misbehavior Detection in IEEE 802.11TM: An Analytical Approach. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8996-2_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8995-5

  • Online ISBN: 978-1-4614-8996-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics