SlideShare a Scribd company logo
To Implement  Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks Ravi Kiran Paladugu Future Networking Laboratory (FuNLabs)
Outline Objective Test-bed – “successfully Implemented” Detector – “static implementation achieved” Video Demo Future work Conclusion
Background With high growing rate of IEEE 802.11 based wireless networks in recent years the security became a concern As a contention based protocol, 802.11 assumes that every participant in the network acts in compliance with the protocol rules
Contd… The open and distributed nature of the protocol makes it possible for selfish nodes to deliberately modify the protocol parameters This leads to unfair share to the network at the expenses of other normal node’s channel access
Objective: With the above focused disadvantages we are motivated to develop a real-time detection scheme and to identify the malicious node We also want to detect the unknown selfish behavior strategy Also I would like to track the successful transmissions and have log of it for dynamic expansion and contraction of the congestion window
Detection Scheme The two challenges are to detect  unknown selfish behavior strategy  and  real-time detection. We came up with an detection scheme based on  non-parametric cumulative sum (CUSUM)  test The CUSUM test statistic is able to accumulate the deviation brought by the selfish behavior of a malicious node and raise an alarm
Contd.. We now monitor the number of successful transmissions of the tagged node every T successful transmissions of the whole network As a selfish node is likely to always obtain more opportunities, the cumulative effect of its selfish behavior can quickly be captured by the CUSUM test Once the CUSUM detects it, an alarm is then raised
Demo:
Future Work: To be able to detect strategy and to implement dynamic detector
Reference : Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks (Jin Tang, Yu Cheng, Yong Hao and Chi Zhou; Dept. of Electrical Engineering, Illinois Institute of Technology) An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks (Jin Tang, Yu Cheng and W. Zhuang, Proc. IEEE INFOCOM, Shanghai, China, Apr 10-15, 2011.)
 

More Related Content

DOCX
automatic test packet generation
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
PDF
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
DOCX
JPJ1432 Automatic Test Packet Generation
PPT
Applications of ATPG
DOCX
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
PPTX
Automatic test packet generation
automatic test packet generation
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
JPJ1432 Automatic Test Packet Generation
Applications of ATPG
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Automatic test packet generation

What's hot (19)

PDF
chaos-monkey-increasing (1) (1)
PDF
Automatic test packet generation in network
PDF
ieee project topic & abstracts in php
PPTX
ATPG flow chart
PDF
Network Security IEEE 2015 Projects
PPTX
Enhanced Adaptive ACKnowledgment (EAACK)
PDF
Wireless Sensor Network Simulation using matlab Iintroductory presenatation
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PPTX
Swans Simulation Research Projects Guidance
PPTX
YATES: Rapid Prototyping for Traffic Engineering Systems
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
PPT
eaack-a secure ids for manet
PPTX
Extract Network and System resource for analysis of Network Security Modeling
PDF
Lan computer networks
PDF
SFA: Stateful Forwarding Abstraction in SDN Data Plane
PPT
Artificial neural network for misuse detection
PDF
Ii3415521555
PDF
Icacci presentation- deep android
PPTX
Artificial neural networks
chaos-monkey-increasing (1) (1)
Automatic test packet generation in network
ieee project topic & abstracts in php
ATPG flow chart
Network Security IEEE 2015 Projects
Enhanced Adaptive ACKnowledgment (EAACK)
Wireless Sensor Network Simulation using matlab Iintroductory presenatation
Vampire attacks draining life from wireless ad hoc sensor networks
Swans Simulation Research Projects Guidance
YATES: Rapid Prototyping for Traffic Engineering Systems
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
eaack-a secure ids for manet
Extract Network and System resource for analysis of Network Security Modeling
Lan computer networks
SFA: Stateful Forwarding Abstraction in SDN Data Plane
Artificial neural network for misuse detection
Ii3415521555
Icacci presentation- deep android
Artificial neural networks
Ad

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
1. Introduction to Computer Programming.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
August Patch Tuesday
PPT
What is a Computer? Input Devices /output devices
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Architecture types and enterprise applications.pdf
Getting Started with Data Integration: FME Form 101
1. Introduction to Computer Programming.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles – August ’25 Week III
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Enhancing emotion recognition model for a student engagement use case through...
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
August Patch Tuesday
What is a Computer? Input Devices /output devices
A contest of sentiment analysis: k-nearest neighbor versus neural network
A comparative study of natural language inference in Swahili using monolingua...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Group 1 Presentation -Planning and Decision Making .pptx
Ad

CPS Final Presentation

  • 1. To Implement Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks Ravi Kiran Paladugu Future Networking Laboratory (FuNLabs)
  • 2. Outline Objective Test-bed – “successfully Implemented” Detector – “static implementation achieved” Video Demo Future work Conclusion
  • 3. Background With high growing rate of IEEE 802.11 based wireless networks in recent years the security became a concern As a contention based protocol, 802.11 assumes that every participant in the network acts in compliance with the protocol rules
  • 4. Contd… The open and distributed nature of the protocol makes it possible for selfish nodes to deliberately modify the protocol parameters This leads to unfair share to the network at the expenses of other normal node’s channel access
  • 5. Objective: With the above focused disadvantages we are motivated to develop a real-time detection scheme and to identify the malicious node We also want to detect the unknown selfish behavior strategy Also I would like to track the successful transmissions and have log of it for dynamic expansion and contraction of the congestion window
  • 6. Detection Scheme The two challenges are to detect unknown selfish behavior strategy and real-time detection. We came up with an detection scheme based on non-parametric cumulative sum (CUSUM) test The CUSUM test statistic is able to accumulate the deviation brought by the selfish behavior of a malicious node and raise an alarm
  • 7. Contd.. We now monitor the number of successful transmissions of the tagged node every T successful transmissions of the whole network As a selfish node is likely to always obtain more opportunities, the cumulative effect of its selfish behavior can quickly be captured by the CUSUM test Once the CUSUM detects it, an alarm is then raised
  • 9. Future Work: To be able to detect strategy and to implement dynamic detector
  • 10. Reference : Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks (Jin Tang, Yu Cheng, Yong Hao and Chi Zhou; Dept. of Electrical Engineering, Illinois Institute of Technology) An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks (Jin Tang, Yu Cheng and W. Zhuang, Proc. IEEE INFOCOM, Shanghai, China, Apr 10-15, 2011.)
  • 11.