Loading…

Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce t...

Full description

Saved in:
Bibliographic Details
Published in:IEEE communications letters 2017-03, Vol.21 (3), p.624-627
Main Authors: Konorski, Jerzy, Szott, Szymon
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3
cites cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3
container_end_page 627
container_issue 3
container_start_page 624
container_title IEEE communications letters
container_volume 21
creator Konorski, Jerzy
Szott, Szymon
description In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.
doi_str_mv 10.1109/LCOMM.2016.2639483
format article
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_LCOMM_2016_2639483</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7782845</ieee_id><sourcerecordid>10_1109_LCOMM_2016_2639483</sourcerecordid><originalsourceid>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</originalsourceid><addsrcrecordid>eNo9kEtOwzAARC0EEqVwAdj4Ain-JbaXUQQUlFKBIrGMHMcGQ_ORbRa5fVNasZmZzZvFA-AWoxXGSN6XxXazWRGEsxXJqGSCnoEFTlORkDnO542ETDiX4hJchfCNEBIkxQvwVnjTusbtXJzgYGH15Y2KAcYBvqgO5v3QT93wG2DllbVOw3fTqXF0_SfMY1T6J0DXw7yF60HDjzJ_DdfgwqpdMDenXoLq8aEq1km5fXou8jLRJOMxYVgrRhrNLFfEMK4ywZEwrRSN5jaTbdNw2kqVGq1Jm1FiMUOSUMy0TamiS0COt9oPIXhj69G7Tvmpxqg-OKn_nNQHJ_XJyQzdHSFnjPkHOBdEsJTuAS7aXZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><source>IEEE Xplore (Online service)</source><creator>Konorski, Jerzy ; Szott, Szymon</creator><creatorcontrib>Konorski, Jerzy ; Szott, Szymon</creatorcontrib><description>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</description><identifier>ISSN: 1089-7798</identifier><identifier>EISSN: 1558-2558</identifier><identifier>DOI: 10.1109/LCOMM.2016.2639483</identifier><identifier>CODEN: ICLEF6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; EDCA ; game theory ; Games ; IEEE 802.11 ; IEEE 802.11 Standard ; Jamming ; QoS ; Quality of service ; selfish behavior ; Throughput ; traffic remapping ; Wireless LAN</subject><ispartof>IEEE communications letters, 2017-03, Vol.21 (3), p.624-627</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</citedby><cites>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</cites><orcidid>0000-0001-5884-5581</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7782845$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Konorski, Jerzy</creatorcontrib><creatorcontrib>Szott, Szymon</creatorcontrib><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><title>IEEE communications letters</title><addtitle>COML</addtitle><description>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</description><subject>Ad hoc networks</subject><subject>EDCA</subject><subject>game theory</subject><subject>Games</subject><subject>IEEE 802.11</subject><subject>IEEE 802.11 Standard</subject><subject>Jamming</subject><subject>QoS</subject><subject>Quality of service</subject><subject>selfish behavior</subject><subject>Throughput</subject><subject>traffic remapping</subject><subject>Wireless LAN</subject><issn>1089-7798</issn><issn>1558-2558</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNo9kEtOwzAARC0EEqVwAdj4Ain-JbaXUQQUlFKBIrGMHMcGQ_ORbRa5fVNasZmZzZvFA-AWoxXGSN6XxXazWRGEsxXJqGSCnoEFTlORkDnO542ETDiX4hJchfCNEBIkxQvwVnjTusbtXJzgYGH15Y2KAcYBvqgO5v3QT93wG2DllbVOw3fTqXF0_SfMY1T6J0DXw7yF60HDjzJ_DdfgwqpdMDenXoLq8aEq1km5fXou8jLRJOMxYVgrRhrNLFfEMK4ywZEwrRSN5jaTbdNw2kqVGq1Jm1FiMUOSUMy0TamiS0COt9oPIXhj69G7Tvmpxqg-OKn_nNQHJ_XJyQzdHSFnjPkHOBdEsJTuAS7aXZg</recordid><startdate>201703</startdate><enddate>201703</enddate><creator>Konorski, Jerzy</creator><creator>Szott, Szymon</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5884-5581</orcidid></search><sort><creationdate>201703</creationdate><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><author>Konorski, Jerzy ; Szott, Szymon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Ad hoc networks</topic><topic>EDCA</topic><topic>game theory</topic><topic>Games</topic><topic>IEEE 802.11</topic><topic>IEEE 802.11 Standard</topic><topic>Jamming</topic><topic>QoS</topic><topic>Quality of service</topic><topic>selfish behavior</topic><topic>Throughput</topic><topic>traffic remapping</topic><topic>Wireless LAN</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Konorski, Jerzy</creatorcontrib><creatorcontrib>Szott, Szymon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Konorski, Jerzy</au><au>Szott, Szymon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</atitle><jtitle>IEEE communications letters</jtitle><stitle>COML</stitle><date>2017-03</date><risdate>2017</risdate><volume>21</volume><issue>3</issue><spage>624</spage><epage>627</epage><pages>624-627</pages><issn>1089-7798</issn><eissn>1558-2558</eissn><coden>ICLEF6</coden><abstract>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</abstract><pub>IEEE</pub><doi>10.1109/LCOMM.2016.2639483</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0001-5884-5581</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1089-7798
ispartof IEEE communications letters, 2017-03, Vol.21 (3), p.624-627
issn 1089-7798
1558-2558
language eng
recordid cdi_crossref_primary_10_1109_LCOMM_2016_2639483
source IEEE Xplore (Online service)
subjects Ad hoc networks
EDCA
game theory
Games
IEEE 802.11
IEEE 802.11 Standard
Jamming
QoS
Quality of service
selfish behavior
Throughput
traffic remapping
Wireless LAN
title Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A51%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Credibility%20of%20Threats%20to%20Jam%20Anonymous%20Traffic%20Remapping%20Attacks%20in%20Ad%20Hoc%20WLANs&rft.jtitle=IEEE%20communications%20letters&rft.au=Konorski,%20Jerzy&rft.date=2017-03&rft.volume=21&rft.issue=3&rft.spage=624&rft.epage=627&rft.pages=624-627&rft.issn=1089-7798&rft.eissn=1558-2558&rft.coden=ICLEF6&rft_id=info:doi/10.1109/LCOMM.2016.2639483&rft_dat=%3Ccrossref_ieee_%3E10_1109_LCOMM_2016_2639483%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7782845&rfr_iscdi=true