The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2012 vol.11)
pp: 1086-1101
Konstantinos Pelechrinis , University of Pittsburgh, Pittsburgh
Guanhua Yan , Los Alamos National Laboratories, Los Alamos
Stephan Eidenbenz , Los Alamos National Laboratories, Los Alamos
Srikanth V. Krishnamurthy , University of California, Riverside, Riverside
ABSTRACT
Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power control has been considered for improving the performance of WLANs. However, we show that, CCA tuning can be exploited by selfish nodes to obtain an unfair share of the available bandwidth. Specifically, a selfish entity can manipulate the CCA threshold to ignore ongoing transmissions; this increases the probability of accessing the medium and provides the entity a higher, unfair share of the bandwidth. We experiment on our 802.11 testbed to characterize the effects of CCA tuning on both isolated links and in 802.11 WLAN configurations. We focus on AP-client(s) configurations, proposing a novel approach to detect this misbehavior. A misbehaving client is unlikely to recognize low power receptions as legitimate packets; by intelligently sending low power probe messages, an AP can efficiently detect a misbehaving node. Our key contributions are: 1) We are the first to quantify the impact of selfish CCA tuning via extensive experimentation on various 802.11 configurations. 2) We propose a lightweight scheme for detecting selfish nodes that inappropriately increase their CCAs. 3) We extensively evaluate our system on our testbed; its accuracy is 95 percent while the false positive rate is less than 5 percent.
INDEX TERMS
Wireless networks, carrier sensing, clear channel assessment threshold, denial of service, selfish behavior, experimentation, analysis.
CITATION
Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy, "Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks", IEEE Transactions on Mobile Computing, vol.11, no. 7, pp. 1086-1101, July 2012, doi:10.1109/TMC.2011.131
REFERENCES
[1] M. Heusse, F. Rousseau, G. Berger-Sabbatel, and A. Duda, "Performance Anomaly of 802.11b," Proc. IEEE INFOCOM, 2003.
[2] V. Mhatre, K. Papagiannaki, and F. Baccelli, "Interference Mitigation through Power Control in High Density 802.11 WLANs," Proc. IEEE INFOCOM, 2007.
[3] I. Broustis, K. Papagiannaki, S.V. Krishnamurthy, M. Faloutsos, and V. Mhatre, "MDG: Measurement-Driven Guidelines for 802.11 WLAN Design," Proc. ACM MobiCom, 2007.
[4] P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks (DSN), 2003.
[5] S. Radosavac, J.S. Baras, and I. Koutsopoulos, "A Framework for MAC Protocol Misbehavior Detection in Wireless Networks," Proc. Fourth ACM Workshop Wireless Security (WiSe), 2005.
[6] M. Raya, J.-P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspot," Proc. ACM MobiSys, 2004.
[7] M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Selfish Behavior in CSMA/CA Networks," Proc. IEEE INFOCOM, 2005.
[8] O. Queseth, "The Effect of Selfish Behavior in Mobile Networks Using CSMA/CA," Proc. Vehicular Technology Conf. (VTC), 2005.
[9] J. Konorski, "Multiple Access in Ad Hoc Wireless LANs with Noncooperative Stations," Proc. Second Int'l IFIP-TC6 Networking Conf. Networking Technologies, Services, and Protocols (NETWORKING '02), 2002.
[10] ANSI/IEEE 802.11-Standard, 1999 ed, IEEE, 1999.
[11] Ath5k Project, http://madwifi.org/wiki/Aboutath5k, 2012.
[12] GNU Radio Trac, http://gnuradio.orgtrac, 2012.
[13] USRP SDR Platform, http:/www.ettus.com, 2012.
[14] J. Lee, S. Choi, and H. Jung, "Analysis of User Behavior and Traffic Pattern in a Large-Scale 802.11a/b Network," Proc. First Workshop Wireless Network Measurements (WiNMee), 2005.
[15] B. O'hara and A. Petrick, IEEE 802.11 Handbook, A Designer's Companion, second ed. IEEE Press, 2005.
[16] U. Paul, S.R. Das, and R. Maheshwari, "Detecting Selfish Carrier-Sense Behavior in WiFi Networks by Passive Monitoring," Proc. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN), 2010.
[17] Soekris-net4826, http://www.soekris.comnet4826.htm, 2012.
[18] The MAdWiFi driver, http:/madwifi.org, 2012.
[19] UC Riverside Wireless Testbed, http://networks.cs.ucr.edutestbed, 2012.
[20] K. Jamienson, B. Hull, A. Miu, and H. Balakrishnan, "Understanding the Real-World Performance of Carrier Sense," Proc. ACM SIGCOMM Workshops, 2005.
[21] J. Zhu, B. Metzler, X. Guo, and Y. Liu, "Adaptive CSMA for Scalable Network Capacity in High-Density WLAN: A Hardware Prototyping Approach," Proc. IEEE INFOCOM, Apr. 2006.
[22] E. Koutsoupias and C. Papadimitriou, "Worst-Case Equilibria," Proc. 16th Ann. Symp. Theoretical Aspects of Computer Science, 1999.
[23] PCAP Unix Man Page, http://www.tcpdump.orgpcap3_ man.html, 2012.
[24] Ping Linux Man Page, http://linux.die.net/man/8ping, 2012.
[25] Click Modular Router, http://read.cs.ucla.educlick, 2012.
[26] S. Zvanovec, P. Pechac, and M. Klepal, "Wireless LAN Networks Design: Site Syrvey or Propagation Models?" Radioeng., vol. 12, no. 4, pp. 42-49, Dec. 2003.
[27] T.S. Rappaport, Wireless Communications: Principles and Practices. Prentice Hall, 2002.
[28] Path-Loss, http://en.wikipedia.org/wikiPath_loss, 2012.
[29] N.R. Draper and H. Smith, Applied Regression Analysis. Wiley-Interscience, 1998.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool