Loading…
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce t...
Saved in:
Published in: | IEEE communications letters 2017-03, Vol.21 (3), p.624-627 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3 |
---|---|
cites | cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3 |
container_end_page | 627 |
container_issue | 3 |
container_start_page | 624 |
container_title | IEEE communications letters |
container_volume | 21 |
creator | Konorski, Jerzy Szott, Szymon |
description | In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest. |
doi_str_mv | 10.1109/LCOMM.2016.2639483 |
format | article |
fullrecord | <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_LCOMM_2016_2639483</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7782845</ieee_id><sourcerecordid>10_1109_LCOMM_2016_2639483</sourcerecordid><originalsourceid>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</originalsourceid><addsrcrecordid>eNo9kEtOwzAARC0EEqVwAdj4Ain-JbaXUQQUlFKBIrGMHMcGQ_ORbRa5fVNasZmZzZvFA-AWoxXGSN6XxXazWRGEsxXJqGSCnoEFTlORkDnO542ETDiX4hJchfCNEBIkxQvwVnjTusbtXJzgYGH15Y2KAcYBvqgO5v3QT93wG2DllbVOw3fTqXF0_SfMY1T6J0DXw7yF60HDjzJ_DdfgwqpdMDenXoLq8aEq1km5fXou8jLRJOMxYVgrRhrNLFfEMK4ywZEwrRSN5jaTbdNw2kqVGq1Jm1FiMUOSUMy0TamiS0COt9oPIXhj69G7Tvmpxqg-OKn_nNQHJ_XJyQzdHSFnjPkHOBdEsJTuAS7aXZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><source>IEEE Xplore (Online service)</source><creator>Konorski, Jerzy ; Szott, Szymon</creator><creatorcontrib>Konorski, Jerzy ; Szott, Szymon</creatorcontrib><description>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</description><identifier>ISSN: 1089-7798</identifier><identifier>EISSN: 1558-2558</identifier><identifier>DOI: 10.1109/LCOMM.2016.2639483</identifier><identifier>CODEN: ICLEF6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; EDCA ; game theory ; Games ; IEEE 802.11 ; IEEE 802.11 Standard ; Jamming ; QoS ; Quality of service ; selfish behavior ; Throughput ; traffic remapping ; Wireless LAN</subject><ispartof>IEEE communications letters, 2017-03, Vol.21 (3), p.624-627</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</citedby><cites>FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</cites><orcidid>0000-0001-5884-5581</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7782845$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Konorski, Jerzy</creatorcontrib><creatorcontrib>Szott, Szymon</creatorcontrib><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><title>IEEE communications letters</title><addtitle>COML</addtitle><description>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</description><subject>Ad hoc networks</subject><subject>EDCA</subject><subject>game theory</subject><subject>Games</subject><subject>IEEE 802.11</subject><subject>IEEE 802.11 Standard</subject><subject>Jamming</subject><subject>QoS</subject><subject>Quality of service</subject><subject>selfish behavior</subject><subject>Throughput</subject><subject>traffic remapping</subject><subject>Wireless LAN</subject><issn>1089-7798</issn><issn>1558-2558</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNo9kEtOwzAARC0EEqVwAdj4Ain-JbaXUQQUlFKBIrGMHMcGQ_ORbRa5fVNasZmZzZvFA-AWoxXGSN6XxXazWRGEsxXJqGSCnoEFTlORkDnO542ETDiX4hJchfCNEBIkxQvwVnjTusbtXJzgYGH15Y2KAcYBvqgO5v3QT93wG2DllbVOw3fTqXF0_SfMY1T6J0DXw7yF60HDjzJ_DdfgwqpdMDenXoLq8aEq1km5fXou8jLRJOMxYVgrRhrNLFfEMK4ywZEwrRSN5jaTbdNw2kqVGq1Jm1FiMUOSUMy0TamiS0COt9oPIXhj69G7Tvmpxqg-OKn_nNQHJ_XJyQzdHSFnjPkHOBdEsJTuAS7aXZg</recordid><startdate>201703</startdate><enddate>201703</enddate><creator>Konorski, Jerzy</creator><creator>Szott, Szymon</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5884-5581</orcidid></search><sort><creationdate>201703</creationdate><title>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</title><author>Konorski, Jerzy ; Szott, Szymon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Ad hoc networks</topic><topic>EDCA</topic><topic>game theory</topic><topic>Games</topic><topic>IEEE 802.11</topic><topic>IEEE 802.11 Standard</topic><topic>Jamming</topic><topic>QoS</topic><topic>Quality of service</topic><topic>selfish behavior</topic><topic>Throughput</topic><topic>traffic remapping</topic><topic>Wireless LAN</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Konorski, Jerzy</creatorcontrib><creatorcontrib>Szott, Szymon</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Konorski, Jerzy</au><au>Szott, Szymon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs</atitle><jtitle>IEEE communications letters</jtitle><stitle>COML</stitle><date>2017-03</date><risdate>2017</risdate><volume>21</volume><issue>3</issue><spage>624</spage><epage>627</epage><pages>624-627</pages><issn>1089-7798</issn><eissn>1558-2558</eissn><coden>ICLEF6</coden><abstract>In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations' QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the arising noncooperative game in which the attackers decide whether to continue a TRA when threatened and honest stations decide whether to start jamming when the TRA is continued. Using a Maynard Smith setting, we prove that the threats are credible to a rational attacker, who will then refrain from playing the game and remain honest.</abstract><pub>IEEE</pub><doi>10.1109/LCOMM.2016.2639483</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0001-5884-5581</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1089-7798 |
ispartof | IEEE communications letters, 2017-03, Vol.21 (3), p.624-627 |
issn | 1089-7798 1558-2558 |
language | eng |
recordid | cdi_crossref_primary_10_1109_LCOMM_2016_2639483 |
source | IEEE Xplore (Online service) |
subjects | Ad hoc networks EDCA game theory Games IEEE 802.11 IEEE 802.11 Standard Jamming QoS Quality of service selfish behavior Throughput traffic remapping Wireless LAN |
title | Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A51%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Credibility%20of%20Threats%20to%20Jam%20Anonymous%20Traffic%20Remapping%20Attacks%20in%20Ad%20Hoc%20WLANs&rft.jtitle=IEEE%20communications%20letters&rft.au=Konorski,%20Jerzy&rft.date=2017-03&rft.volume=21&rft.issue=3&rft.spage=624&rft.epage=627&rft.pages=624-627&rft.issn=1089-7798&rft.eissn=1558-2558&rft.coden=ICLEF6&rft_id=info:doi/10.1109/LCOMM.2016.2639483&rft_dat=%3Ccrossref_ieee_%3E10_1109_LCOMM_2016_2639483%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c267t-41ca42bc4f7a2e47a68708ed98bc7f69dbb73d9a5ecc2d632f14092314cf53a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7782845&rfr_iscdi=true |