The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - October-December (2010 vol.7)
pp: 410-423
Mi Kyung Han , University of Texas at Austin, Austin
ABSTRACT
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense of other users. Such misbehaviors threaten the performance and availability of hotspot networks and have recently attracted increasing research attention. However, the existing work so far focuses on sender-side misbehavior. Motivated by the observation that many hotspot users receive more traffic than they send, we study greedy receivers in this paper. We identify a range of greedy receiver misbehaviors, and quantify their damage using both simulation and testbed experiments. Our results show that even though greedy receivers do not directly control data transmission, they can still result in very serious damage, including completely shutting off the competing traffic. To address the issues, we further develop techniques to detect and mitigate greedy receiver misbehavior, and demonstrate their effectiveness.
INDEX TERMS
Wireless communication, local-area networks.
CITATION
Mi Kyung Han, "Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection", IEEE Transactions on Dependable and Secure Computing, vol.7, no. 4, pp. 410-423, October-December 2010, doi:10.1109/TDSC.2010.2
REFERENCES
[1] I. Aad, J. Hubaux, and E. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks," IEEE/ACM Trans. Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.
[2] J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 12th USENIX Security Symp., Aug. 2003.
[3] M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Selfish Behavior in CSMA/CA Networks," Proc. IEEE Infocom, Mar. 2005.
[4] Click, http://pdos.csail.mit.educlick/, 2010.
[5] I.C.S.L.M.S. Committee, IEEE 802.11: Wireless LAN Medium Access Control and Physical Layer Specifications, Aug. 1999.
[6] L. Guang, C. Assi, and A. Benslimane, "Modeling and Analysis of Predictable Random Backoff in Selfish Environments," Proc. ACM/IEEE Int'l Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2006.
[7] Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy, special issue on making wireless work, vol. 2, no. 3, pp. 28-39, May 2004.
[8] In-stat, http://www.in-stat.com/catalogWcatalogue.asp?id= 167 , 2010.
[9] Revenue from Wireless Hotspots, http://blogs.zdnet.com/ ITFactsindex.php?blogthis=1&p=9319 , 2010.
[10] D. Kotz and K. Essien, "Analysis of a Campus-Wide Wireless Network," Proc. ACM MOBICOM, Sept. 2002.
[11] A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew versus the Mice and Elephants)," Proc. ACM SIGCOMM, Aug. 2003.
[12] P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, Apr. 2004.
[13] The Network Simulator—ns-2, http://www.isi.edu/nsnamns/, 2010.
[14] M. Raya, I. Aad, J.P. Hubaux, and A.E. Fawal, "DOMINO: Detecting Mac Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
[15] M. Raya, J.P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," Proc. MobiSys, Sept. 2004.
[16] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Measurement-Based Models of Delivery and Interference," Proc. ACM SIGCOMM, 2006.
[17] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP Congestion Control with a Misbehaving Receiver," Proc. ACM Computer Comm. Rev., Oct. 1999.
[18] R. Sinha, C. Papadopoulos, and J. Heidemann, "Internet Packet Size Distributions: Some Observations," Technical Report ISI-TR-2007-643, USC/Information Sciences Inst., May 2007.
[19] D. Tang, "Analysis of a Local-Area Wireless Network," Proc. MOBICOM, Sept. 2000.
[20] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, May 2005.
9 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool