This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
December 2006 (vol. 5 no. 12)
pp. 1691-1705
IEEE 802.11 works properly only if the stations respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter. We explain how easily this can be performed, in particular, with the new generation of adapters. We then present DOMINO (Detection Of greedy behavior in the MAC layer of IEEE 802.11 public NetwOrks), a piece of software to be installed in or near the Access Point. DOMINO can detect and identify greedy stations without requiring any modification of the standard protocol. We illustrate these concepts by simulation results and by the description of a prototype that we have recently implemented.

[1] http:/domino.epfl.ch, 2006.
[2] http:/www.airdefense.net, 2003.
[3] IEEE Standard for Wireless LAN—Medium Access Control and Physical Layer Specification, P802.11, IEEE, 1999.
[4] IEEE Draft, Supplement to Part 11: Medium Access Control Enhancements for Quality of Service, IEEE 802.11e/D4.3, IEEE, 2003.
[5] I. Aad, J.P. Hubaux, and E. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. MobiCom, 2004.
[6] A. Akella, S. Seshan, R. Karp, and S. Shenker, “Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP,” Proc. SIGCOMM, 2002.
[7] M.G. Arranz, R. Aguero, L. Munoz, and P. Mahonen, “Behavior of UDP-Based Applications over IEEE 802.11 Wireless Networks,” Proc. 12th IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm., Sept.-Oct. 2001.
[8] M. Balazinska and P. Castro, “Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network,” Proc. MobiSys, May 2003.
[9] C. Barrett, M. Marathe, D. Engelhart, and A. Sivasubramaniam, “Analyzing the Short-Term Fairness of IEEE 802.11 in Wireless Multi-Hop Radio Networks,” Proc. 10th IEEE Int'l Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems, 2002.
[10] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., Aug. 2003.
[11] N. BenSalem, L. Buttyán, J.P. Hubaux, and M. Jakobsson, “A Charging and Rewarding Scheme for Packet Forwarding in Multihop Cellular Networks,” Proc. MobiHoc, 2003.
[12] G. Berger-Sabbatel, A. Duda, M. Heusse, and F. Rousseau, “Short-Term Fairness of 802.11 Networks with Several Hosts,” Proc. Conf. Mobile and Wireless Comm. Networks, Oct. 2004.
[13] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.
[14] L. Buttyán and J.P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, Oct. 2003.
[15] M. Cagalj, S. Ganeriwal, I. Aad, and J.P. Hubaux, “On Selfish Behavior in CSMA/CA Networks,” Proc. IEEE INFOCOM, Mar. 2005.
[16] J. Edney and W.A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, 2004.
[17] K. Fall and K. Varadhan, “NS Notes and Documentation,” The VINT Project, 2003.
[18] M. Heusse, F. Rousseau, G. Berger-Sabbatel, and A. Duda, “Performance Anomaly of 802.11b,” Proc. INFOCOM, 2003.
[19] J.P. Hubaux, Th. Gross, J.Y. Le Boudec, and M. Vetterli, “Towards Self-Organizing Mobile Ad Hoc Networks: The Terminodes Project,” IEEE Comm. Magazine, vol. 39, no. 1, pp. 118-124, Jan. 2001.
[20] R. Ja, The Art of Computer Systems Performance Analysis. John Wiley and Sons, 1991.
[21] C. Koksal, H. Kassab, and H. Balakrishnan, “An Analysis of Short-Term Fairness in Wireless Media Access Protocols,” Proc. SIGMETRICS, June 2000.
[22] J. Konorski, “Multiple Access in Ad Hoc Wireless LANs with Noncooperative Stations,” Proc. Networking Conf., 2002.
[23] D. Kotz and K. Essien, “Analysis of a Campus-Wide Wireless Network,” Proc. MobiCom, Sept. 2002.
[24] A. Kuzmanovic and E. Knightly, “Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants),” Proc. SIGCOMM, Aug. 2003.
[25] P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept.-Oct. 2005.
[26] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, 2000.
[27] T. Nandagopal, T. Kim, X. Gao, and V. Bharghavan, “Achieving MAC Layer Fairness in Wireless Packet Networks,” Proc. MobiCom, 2000.
[28] M. Raya, J.P. Hubaux, and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” Proc. MobiSys, June 2004.
[29] D. Tang and M. Baker, “Analysis of a Local-Area Wireless Network,” Proc. MobiCom, Aug. 2000.
[30] C. Ware, J. Judge, J. Chicharo, and E. Dutkiewicz, “Unfairness and Capture Behaviour in 802.11 Ad Hoc Networks,” Proc. IEEE Int'l Conf. Comm., 2000.
[31] G. Xylomenos and G. Polyzos, “TCP and UDP Performance over a Wireless LAN,” Proc. INFOCOM, Mar. 1999.
[32] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks,” Proc. MobiCom, 2000.

Index Terms:
Public networks, network monitoring, wireless local-area networks, IEEE 802.11, medium access control, greedy behavior.
Citation:
Maxim Raya, Imad Aad, Jean-Pierre Hubaux, Alaeddine El Fawal, "DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Transactions on Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006, doi:10.1109/TMC.2006.183
Usage of this product signifies your acceptance of the Terms of Use.