Loading…
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce t...
Saved in:
Published in: | IEEE communications letters 2017-03, Vol.21 (3), p.624-627 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest. |
---|---|
ISSN: | 1089-7798 1558-2558 |
DOI: | 10.1109/LCOMM.2016.2639483 |