TY - GEN
T1 - Impact of optimal MAC layer attacks on the network layer
AU - Radosavac, Svetlana
AU - Baras, John S.
AU - Moustakides, George V.
PY - 2006
Y1 - 2006
N2 - Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node misbehavior in the Medium Access Control (MAC) layer and its effects on the performance of the network layer. In order to capture uncertainty of the attacker's strategy as well as the unpredictable nature of the wireless medium, we quantify the optimal attack strategy by using the principle of minimum cross-entropy. Following that, we apply the obtained results for analysis of the IEEE 802.11 DCF MAC protocol and investigate the effects of such optimal attacks on the network layer. Finally, we evaluate the robustness of two different routing protocols against the worst-case MAC layer attacks and justify the need for the MAC layer-based Intrusion Detection Sytems (IDS).
AB - Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node misbehavior in the Medium Access Control (MAC) layer and its effects on the performance of the network layer. In order to capture uncertainty of the attacker's strategy as well as the unpredictable nature of the wireless medium, we quantify the optimal attack strategy by using the principle of minimum cross-entropy. Following that, we apply the obtained results for analysis of the IEEE 802.11 DCF MAC protocol and investigate the effects of such optimal attacks on the network layer. Finally, we evaluate the robustness of two different routing protocols against the worst-case MAC layer attacks and justify the need for the MAC layer-based Intrusion Detection Sytems (IDS).
KW - Ad-hoc networks
KW - Cross-layer
KW - MAC layer
KW - Minmax robust detection
KW - Protocol misbehavior
UR - http://www.scopus.com/inward/record.url?scp=34547422843&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34547422843&partnerID=8YFLogxK
U2 - 10.1145/1180345.1180362
DO - 10.1145/1180345.1180362
M3 - Conference contribution
AN - SCOPUS:34547422843
SN - 1595935541
SN - 9781595935540
T3 - Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
SP - 135
EP - 146
BT - Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
T2 - 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
Y2 - 30 October 2006 through 30 October 2006
ER -