Detecting Transmission Power Misbehaviour in Wi-Fi Networks

In Wi-Fi networks, transmission (TX) power levels are constrained by regulatory limits. However, the emergence of flexible MAC drivers allows the easy modification of PHY and MAC layer parameters. This has enabled users to attempt to violate these limits. Such actions, which we refer to as TX power misbehaviour, allow users to achieve higher throughput due to the capture effect. Detecting this type of misbehaviour is challenging because of the inability to directly measure the TX power of a user's device. Therefore, in this paper, we propose detection methods for (a) determining if the TX power violates regulatory limits and (b) estimating the TX power value. Separate methods are proposed for single and multi-rate modes of operation. Simulation results verify that the proposed methods may be successfully used to detect TX power misbehaviour. Therefore, they can be implemented in a general misbehaviour detection and reaction architecture, also presented in this paper.

[1]  Szymon Szott,et al.  What's new for QoS in IEEE 802.11? , 2013, IEEE Network.

[2]  Alexandros G. Fragkiadakis,et al.  Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.

[3]  Szymon Szott,et al.  Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach , 2013, Secur. Commun. Networks.

[4]  Dirk Grunwald,et al.  MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs , 2006, MobiSys '06.

[5]  Yanghee Choi,et al.  An experimental study on the capture effect in 802.11a networks , 2007, WinTECH '07.

[6]  Marek Natkaniec,et al.  An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes , 2008, 2008 International Conference on Information Networking.

[7]  Marek Natkaniec,et al.  A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations , 2000, PWC.

[8]  Ilenia Tinnirello,et al.  Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.

[9]  John S. Baras,et al.  Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Chadi Assi,et al.  MAC layer misbehavior in wireless networks: challenges and solutions , 2008, IEEE Wireless Communications.

[11]  Leo Monteban,et al.  WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.

[12]  Szymon Szott,et al.  An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes , 2010, EURASIP J. Wirel. Commun. Netw..

[13]  Szymon Szott,et al.  Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..