Cargando…
Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, s...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855027/ https://www.ncbi.nlm.nih.gov/pubmed/29385752 http://dx.doi.org/10.3390/s18020404 |
_version_ | 1783307017394323456 |
---|---|
author | Parras, Juan Zazo, Santiago |
author_facet | Parras, Juan Zazo, Santiago |
author_sort | Parras, Juan |
collection | PubMed |
description | We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality. |
format | Online Article Text |
id | pubmed-5855027 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-58550272018-03-20 Wireless Networks under a Backoff Attack: A Game Theoretical Perspective Parras, Juan Zazo, Santiago Sensors (Basel) Article We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality. MDPI 2018-01-30 /pmc/articles/PMC5855027/ /pubmed/29385752 http://dx.doi.org/10.3390/s18020404 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Parras, Juan Zazo, Santiago Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title | Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title_full | Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title_fullStr | Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title_full_unstemmed | Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title_short | Wireless Networks under a Backoff Attack: A Game Theoretical Perspective |
title_sort | wireless networks under a backoff attack: a game theoretical perspective |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5855027/ https://www.ncbi.nlm.nih.gov/pubmed/29385752 http://dx.doi.org/10.3390/s18020404 |
work_keys_str_mv | AT parrasjuan wirelessnetworksunderabackoffattackagametheoreticalperspective AT zazosantiago wirelessnetworksunderabackoffattackagametheoreticalperspective |