Policing 802.11 MAC Misbehaviours

With the increasing availability of flexible wireless 802.11 devices, the potential exists for users to selfishly manipulate their channel access parameters and gain a performance advantage. Such practices can have a severe negative impact on compliant stations. To enable access points to counteract these selfish behaviours and preserve fairness in wireless networks, in this paper we propose a policing mechanism that drives misbehaving users into compliant operation without requiring any cooperation from clients. This approach is demonstrably effective against a broad class of misbehaviours, soundly-based, i.e., provably hard to circumvent and amenable to practical implementation on existing commodity hardware.

[1]  Szymon Szott,et al.  Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..

[2]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[3]  A. Bacciotti,et al.  Liapunov functions and stability in control theory , 2001 .

[4]  Weihua Zhuang,et al.  An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  Seungjoon Lee,et al.  Maranello: Practical Partial Packet Recovery for 802.11 , 2010, NSDI.

[6]  David Malone,et al.  Mitigating collisions through power-hopping to improve 802.11 performance , 2014, Pervasive Mob. Comput..

[7]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[8]  Ilenia Tinnirello,et al.  Temporal fairness provisioning in multi-rate contention-based 802.11e WLANs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[9]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[10]  Giulio Iannello,et al.  ACKS: a technique to reduce the impact of legacy stations in 802.11e EDCA WLANs , 2005, IEEE Communications Letters.

[11]  Douglas J. Leith,et al.  Proportional Fairness in 802.11 Wireless LANs , 2011, IEEE Communications Letters.

[12]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[13]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Oliver W. W. Yang,et al.  Throughput Modeling and Analysis of IEEE 802.11 DCF with Selfish Node , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[15]  PengYong,et al.  IEEE 802.11 distributed coordination function , 2003 .

[16]  John C. Bicket,et al.  Bit-rate selection in wireless networks , 2005 .

[17]  Elisabeth Buffard,et al.  VLC Media Player , 2012 .

[18]  David Malone,et al.  H-RCA: 802.11 Collision-Aware Rate Control , 2013, IEEE/ACM Transactions on Networking.

[19]  D. Malone,et al.  Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions , 2007, IEEE/ACM Transactions on Networking.

[20]  David Malone,et al.  Incentivising Fairness and Policing Nodes in WiFi , 2011, IEEE Communications Letters.

[21]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[22]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[23]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[24]  Christoph Neumann,et al.  An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[25]  Stephen A. McGuire,et al.  Introductory Statistics , 2007, Technometrics.

[26]  Luca Vollero,et al.  Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.

[27]  Ilenia Tinnirello,et al.  MAClets: active MAC protocols over hard-coded devices , 2012, CoNEXT '12.

[28]  Thomas H. Wonnacott,et al.  Introductory Statistics , 2007, Technometrics.

[29]  John V. Guttag,et al.  Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.

[30]  David Malone,et al.  Exploiting the capture effect to improve WLAN throughput , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[31]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[32]  Weihua Zhuang,et al.  Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach , 2014, IEEE Transactions on Mobile Computing.

[33]  David J. Thuente,et al.  Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[34]  John S. Baras,et al.  Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.

[35]  Giulio Iannello,et al.  Frame dropping: A QoS mechanism for multimedia communications in WiFi hot spots , 2004 .

[36]  Albert Banchs,et al.  Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.

[37]  Ilenia Tinnirello,et al.  Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[38]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[39]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[40]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[41]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[42]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[43]  Paul Barford,et al.  Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.

[44]  Ilenia Tinnirello,et al.  Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.