Skip to main content

Adaptive Misbehavior Detection in IEEE 802.11TM Based on Markov Decision Process

  • Chapter
  • First Online:
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 694 Accesses

Abstract

To achieve better detection performance, we enhance the FS detector from Chap. 2 to develop an adaptive detector with the Markov decision process (MDP). In particular, we adaptively make decisions on how aggressively the detector value should be updated in each step. Then based on a reward function defined by us, we are able to determine an optimal decision policy to maximize the overall system benefit through a linear programming formulation. The optimal policy also indicates the operation of the adaptive detector, which yields better performance in both false positive rate and detection delay. Both theoretical analysis and simulation results are provided to demonstrate the performance of the adaptive detector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An observation window is defined as a certain number of consecutive successful transmissions over the whole network [17].

References

  1. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.

    Google Scholar 

  2. B. Brodsky and B. Darkhovsky, Nonparametric Methods in Change-point Problems, Kluwer Academic Publisher, 1993.

    Google Scholar 

  3. M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, “On Cheating in CSMA/CA Ad Hoc Networks,” Technical Report IC/2004/24, EPFL-DI-ICA, 2004.

    Google Scholar 

  4. C. E. Koksal, H. Kassab and H. Balakrishnan, “An Analysis of Short-Term Fairness in Wireless Media Access Protocols,” in Proc. ACM SIGMETRICS, 2000.

    Google Scholar 

  5. J. Konorski, “Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting,” in PROMS, vol. 2213 of LNCS. Springer, 2001.

    Google Scholar 

  6. J. Konorski, “Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations,” in NETWORKING, vol. 2345 of LNCS. Springer, 2002.

    Google Scholar 

  7. P. Kyasanur and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” in Proc. IEEE DSN, 2003, pp. 173–182.

    Google Scholar 

  8. P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” in IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502–516, 2005.

    Google Scholar 

  9. H. V. Poor and O. Hadjiliadis, Quickest Detection, first edition, Cambridge, 2008.

    Google Scholar 

  10. S. Radosavac, J. S. Baras and I. Koutsopoulos, “A Framework for MAC Protocol Misbehavior Detection in Wireless Networks,” in Proc. ACM Workshop on Wireless Security, 2005, pp. 33–42.

    Google Scholar 

  11. S. Radosavac, G. Moustakides, J. Baras and I. Koutsopoulos, “An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks,” in ACM Trans. Information and Systems Security, vol. 11, no. 4, article no. 19, Jul. 2008.

    Google Scholar 

  12. M. Raya, J. Hubaux and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” in Proc. ACM MobiSys, 2004.

    Google Scholar 

  13. M. Raya, I, Aad, J. Hubaux and A. El Fawal, “DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots,” in IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691–1705, Dec. 2006.

    Google Scholar 

  14. Y. Rong, S. Lee and H. Choi, “Detecting Stations Cheating on Backoff Rules in 802.11 Networks using Sequential Analysis,” in Proc. IEEE INFOCOM, 2006, pp. 1–13.

    Google Scholar 

  15. S. M. Ross, Introduction to Probability Models. Elsevier Academic Press, 9th edn., 2007.

    Google Scholar 

  16. J. Tang, Y. Cheng, Y. Hao and C. Zhou, “Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks,” in Proc. IEEE VTC-Fall, 2010.

    Google Scholar 

  17. J. Tang, Y. Cheng, and W. Zhuang, “An Analytical Approach to Real-Time Misbehavior Detection in IEEE 802.11 Based Wireless Networks,” in Proc. IEEE INFOCOM, 2011.

    Google Scholar 

  18. The Network Simulator - ns-2, [Online.] Available: http://www.isi.edu/nsnam/ns/.

  19. A. Toledo and X. Wang, “A Robust Kolmogorov-Smirnov Detector for Misbehavior IEEE 802.11 DCF,” in Proc. IEEE ICC, 2007, pp. 1564–1569.

    Google Scholar 

  20. A. Toledo and X. Wang, “Robust Detection of Selfish Misbehavior in Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124–1134, Aug. 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tang, J., Cheng, Y. (2013). Adaptive Misbehavior Detection in IEEE 802.11TM Based on Markov Decision Process. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8996-2_3

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8995-5

  • Online ISBN: 978-1-4614-8996-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics