This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
October-December 2010 (vol. 7 no. 4)
pp. 410-423
Mi Kyung Han, University of Texas at Austin, Austin
Lili Qiu, University of Texas at Austin, Austin
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense of other users. Such misbehaviors threaten the performance and availability of hotspot networks and have recently attracted increasing research attention. However, the existing work so far focuses on sender-side misbehavior. Motivated by the observation that many hotspot users receive more traffic than they send, we study greedy receivers in this paper. We identify a range of greedy receiver misbehaviors, and quantify their damage using both simulation and testbed experiments. Our results show that even though greedy receivers do not directly control data transmission, they can still result in very serious damage, including completely shutting off the competing traffic. To address the issues, we further develop techniques to detect and mitigate greedy receiver misbehavior, and demonstrate their effectiveness.

[1] I. Aad, J. Hubaux, and E. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks," IEEE/ACM Trans. Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.
[2] J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 12th USENIX Security Symp., Aug. 2003.
[3] M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Selfish Behavior in CSMA/CA Networks," Proc. IEEE Infocom, Mar. 2005.
[4] Click, http://pdos.csail.mit.educlick/, 2010.
[5] I.C.S.L.M.S. Committee, IEEE 802.11: Wireless LAN Medium Access Control and Physical Layer Specifications, Aug. 1999.
[6] L. Guang, C. Assi, and A. Benslimane, "Modeling and Analysis of Predictable Random Backoff in Selfish Environments," Proc. ACM/IEEE Int'l Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2006.
[7] Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy, special issue on making wireless work, vol. 2, no. 3, pp. 28-39, May 2004.
[8] In-stat, http://www.in-stat.com/catalogWcatalogue.asp?id= 167 , 2010.
[9] Revenue from Wireless Hotspots, http://blogs.zdnet.com/ ITFactsindex.php?blogthis=1&p=9319 , 2010.
[10] D. Kotz and K. Essien, "Analysis of a Campus-Wide Wireless Network," Proc. ACM MOBICOM, Sept. 2002.
[11] A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew versus the Mice and Elephants)," Proc. ACM SIGCOMM, Aug. 2003.
[12] P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, Apr. 2004.
[13] The Network Simulator—ns-2, http://www.isi.edu/nsnamns/, 2010.
[14] M. Raya, I. Aad, J.P. Hubaux, and A.E. Fawal, "DOMINO: Detecting Mac Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
[15] M. Raya, J.P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," Proc. MobiSys, Sept. 2004.
[16] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Measurement-Based Models of Delivery and Interference," Proc. ACM SIGCOMM, 2006.
[17] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP Congestion Control with a Misbehaving Receiver," Proc. ACM Computer Comm. Rev., Oct. 1999.
[18] R. Sinha, C. Papadopoulos, and J. Heidemann, "Internet Packet Size Distributions: Some Observations," Technical Report ISI-TR-2007-643, USC/Information Sciences Inst., May 2007.
[19] D. Tang, "Analysis of a Local-Area Wireless Network," Proc. MOBICOM, Sept. 2000.
[20] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, May 2005.

Index Terms:
Wireless communication, local-area networks.
Citation:
Mi Kyung Han, Lili Qiu, "Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection," IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 4, pp. 410-423, Oct.-Dec. 2010, doi:10.1109/TDSC.2010.2
Usage of this product signifies your acceptance of the Terms of Use.