Quality of service games in an IEEE 802.11 ad hoc wireless LAN
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
Alleviating reader collision problem in mobile RFID networks
Personal and Ubiquitous Computing
A Priority Based Transaction mechanism towards high reliable RFID services
International Journal of Ad Hoc and Ubiquitous Computing
Capacity and fairness of an ad hoc IEEE 802.11 cell with sophisticated noncooperative stations
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
On the uniqueness of Nash equilibrium in ALOHA games with group of selfish users
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
On scheduling transmissions for hidden terminal problems in dynamic RFID systems
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
A survey of techniques for incremental learning of HMM parameters
Information Sciences: an International Journal
Hi-index | 0.00 |
Ad-hoc IEEE 802.11 LANs employ CSMA/CA at the MAC layer. CSMA/CA selects a random backoff time from a contention window that grows from wmin to wmax upon consecutive frame collisions. A selfish backoff attack by configuring small wmin and/or wmax (i.e., systematic selection of short backoff times) brings the attacking station an unfairly large long-term bandwidth share. To evaluate the impact of backoff attacks we use Bianchi's model of a saturated CSMA/CA network. So far, its solvability has been rigorously established only for identical wmin and wmax at all stations. We ask whether the model remains solvable for a general backoff attack scenario, where wmin and wmax differ from station to station. Although we find the answer negative, we formulate a sufficient condition for solvability that covers realistic backoff attacks. Based on the obtained bandwidth distribution and power efficiency we point to several features of CSMA/CA under a backoff attack.