Analysis of a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

by   Jerzy Konorski, et al.

Multi-hop ad hoc networks are susceptible to selfish misbehavior such as traffic remapping attacks (TRAs). Selfish nodes launching such attacks acquire unduly high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. TRAs are easy to execute, impossible to prevent, difficult to detect, and detrimental to the QoS of non-selfish nodes. In this paper we adopt a game-theoretic approach to analyze TRAs in multi-hop ad hoc networks. We present a formal model of opportunistic plausible TRAs and the corresponding one-shot non-cooperative game. Using a heuristic rank-based payoff function, we propose a boundedly rational multistage attack strategy that both selfish and non-selfish nodes are free to use, and that allows non-selfish nodes to respond in kind to TRAs. We analyze quasi-equilibria of the arising multistage game and verify via simulation that it often coincides with a Nash equilibrium at which nodes are restrained from executing harmful TRAs, whereas harmless TRAs are permitted. Finally, we determine whether boundedly rational nodes are likely to follow alternative multistage behavior rather than the proposed multistage strategy.


page 1

page 2

page 3

page 4


Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks

In the paradigm of mobile Ad hoc networks (MANET), forwarding packets or...

An Adaptive Channel Reservation MAC Protocol Based on Forwarding Traffic of Key Nodes

Ad Hoc networks with multi-hop topology are widely used in military and ...

Physical Layer Security-Aware Routing and Performance Tradeoffs in Ad Hoc Networks

The application of physical layer security in ad hoc networks has attrac...

A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

In wireless networks, stations can improve their received quality of ser...

Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system

Motivated by the concerns of cooperation security, this work examines se...

Multi-Hop Communication for nTorrent in a Wireless Ad Hoc Environment

nTorrent is a BitTorrent-like application that is based on NDN (Named Da...

Overhead Control with Reliable Transmission of Popular Packets in Ad-Hoc Social Networks

Reliable social connectivity and transmission of data for popular nodes ...

Please sign up or login with your details

Forgot password? Click here to reset