Cargando…

Wireless Networks under a Backoff Attack: A Game Theoretical Perspective

We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, s...

Descripción completa

Detalles Bibliográficos
Autores principales: Parras, Juan, Zazo, Santiago
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855027/
https://www.ncbi.nlm.nih.gov/pubmed/29385752
http://dx.doi.org/10.3390/s18020404
_version_ 1783307017394323456
author Parras, Juan
Zazo, Santiago
author_facet Parras, Juan
Zazo, Santiago
author_sort Parras, Juan
collection PubMed
description We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality.
format Online
Article
Text
id pubmed-5855027
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-58550272018-03-20 Wireless Networks under a Backoff Attack: A Game Theoretical Perspective Parras, Juan Zazo, Santiago Sensors (Basel) Article We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality. MDPI 2018-01-30 /pmc/articles/PMC5855027/ /pubmed/29385752 http://dx.doi.org/10.3390/s18020404 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Parras, Juan
Zazo, Santiago
Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title_full Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title_fullStr Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title_full_unstemmed Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title_short Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
title_sort wireless networks under a backoff attack: a game theoretical perspective
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855027/
https://www.ncbi.nlm.nih.gov/pubmed/29385752
http://dx.doi.org/10.3390/s18020404
work_keys_str_mv AT parrasjuan wirelessnetworksunderabackoffattackagametheoreticalperspective
AT zazosantiago wirelessnetworksunderabackoffattackagametheoreticalperspective