Mac-layer approaches for security and performance enhancement in ieee 802.11

Over the past few years, wireless networks are becoming increasingly popular. The dominant question facing the wireless network today is: how can the network meet the needs of various users and applications? Two basic and primary needs for users are efficiency and security. To deal with these two concerns, this dissertation investigates the two areas and proposes four MAC-level approaches for security and performance enhancement in IEEE 802.11. In the first part, we propose three MAC-level approaches to improve the throughput performance in wireless LANs, i.e., the Freeze Counter scheme (FC), the Dynamically Adaptive Retransmission (DAR), and the Quick Acknowledgement (QA) scheme. The Freeze Counter scheme is an adaptive error recovery mechanism in 802.11, which can perform different actions according to the reasons for frame losses. Dynamically Adaptive Retransmission scheme is an enhanced feedback scheme in 802.11. We propose a Quick Acknowledgement (QA) scheme as a replacement for positive acknowledgement in IEEE 802.11. By using similar concepts as selective ACK and negative ACK, the proposed protocol solves the inefficiency problem of positive ACK in 802.11. In the second part, we propose a lightweight statistical authentication protocol for wireless networks. With more and more applications on wireless networks, new concerns are raised when it comes to security issues. Authentication service particularly becomes one of the basic but necessary security measures for wireless applications. However, traditional authentication protocols for wired networks do not work well in a wireless environment due to unique characteristics. To meet this target, we propose a lightweight statistical authentication protocol for wireless networks, namely Shepherd. To solve the inherent out-of-sync problem with Shepherd protocol, we develop three synchronization schemes with their statistical methods. In Shepherd, the legitimacy of a mobile node is determined by continuously checking a series of random authentication bits where each bit in this stream is piggybacked by a packet. Such an authentication bit stream is generated by both mobile node and access point using the same random number generator under the same shared seed as a key. The complete evaluation and analysis of all proposed approaches have been discussed.

[1]  Kang G. Shin,et al.  Energy-efficient PCF operation of IEEE 802.11a WLANs via transmit power control , 2003, Comput. Networks.

[2]  Claude Castelluccia,et al.  Differentiation mechanisms for IEEE 802.11 , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[3]  Masanori Nakahara Theoretical Throughput/Delay Analysis for Variable Packet Length in the 802.11 MAC Protocol , 2003, ICOIN.

[4]  Upkar Varshney,et al.  The Status and Future of 802.11-Based WLANs , 2003, Computer.

[5]  Barry E. Mullins,et al.  A wireless local area network protocol that improves throughput via adaptive control , 1997, Proceedings of ICC'97 - International Conference on Communications.

[6]  Haoli Wang,et al.  Improving wireless LAN performance via adaptive retransmission , 2003 .

[7]  Sally Floyd,et al.  TCP Selective Acknowledgement Options , 1996 .

[8]  Hari Balakrishnan,et al.  Explicit Loss Notification and Wireless Web Performance , 2006 .

[9]  Shugong Xu,et al.  Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? , 2001, IEEE Commun. Mag..

[10]  Fan Zhao,et al.  RBWA: an efficient random-bit window-based authentication protocol , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[11]  Ting-Chao Hou,et al.  Performance Evaluation of Wireless Multihop Ad Hoc Networks Using IEEE 802.11 DCF Protocol , 2003 .

[12]  Marco Conti,et al.  IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism , 2000, IEEE Journal on Selected Areas in Communications.

[13]  Haoli Wang,et al.  An SSCOP-based link layer protocol for wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[14]  Arun K. Singh Deployment of Public-Key Infrastructure in Wireless Data Networks , 2001, ICN.

[15]  Shuji Tasaka,et al.  Performance Evaluation of Video Transmission with the PCF of the IEEE 802.11 Standard MAC Protocol , 2000 .

[16]  Yang Xiao,et al.  Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.

[17]  Bob O'Hara,et al.  The IEEE 802.11 Handbook: A Designer's Companion , 1999 .

[18]  Michael G. Barry,et al.  Supporting service differentiation in wireless packet networks using distributed control , 2001, IEEE J. Sel. Areas Commun..

[19]  Randy H. Katz,et al.  Satellite Transport Protocol (STP): An SSCOP-based Transport Protocol for Datagram Satellite Networks , 1997 .

[20]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[21]  Randy H. Katz,et al.  A trace-based approach for modeling wireless channel behavior , 1996, Winter Simulation Conference.

[22]  Adam Wolisz,et al.  Performance study of access control in wireless LANs – IEEE 802.11 DFWMAC and ETSI RES 10 Hiperlan , 1997, Mob. Networks Appl..

[23]  Shiann-Tsong Sheu,et al.  A bandwidth allocation/sharing/extension protocol for multimedia over IEEE 802.11 ad hoc wireless LANs , 2001, IEEE J. Sel. Areas Commun..

[24]  Peter Steenkiste,et al.  Improving wireless LAN performance via adaptive local error control , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[25]  Biplab Sikdar,et al.  On the impact of IEEE 802.11 MAC on traffic characteristics , 2003, IEEE J. Sel. Areas Commun..

[26]  Hantao Song,et al.  Research and implementation of mobile ad hoc network emulation system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[27]  Matthew Mathis,et al.  Forward acknowledgement: refining TCP congestion control , 1996, SIGCOMM 1996.

[28]  He Huang,et al.  SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11 , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[29]  Shugong Xu,et al.  Revealing the problems with 802.11 medium access control protocol in multi-hop wireless ad hoc networks , 2002, Comput. Networks.

[30]  Thomas R. Henderson,et al.  Design principles and performance analysis of SSCOP: a new ATM adaptation layer protocol , 1995, CCRV.

[31]  Claude Castelluccia,et al.  EnhancingIEEE 802.11 performance in congested environments , 2003, Ann. des Télécommunications.

[32]  W.A. Arbaugh Wireless Security Is Different , 2003, Computer.

[33]  Uri Blumenthal,et al.  Wireless network security architecture , 2002, Bell Labs Technical Journal.

[34]  Refik Molva,et al.  Security in Ad Hoc Networks , 2003, PWC.

[35]  Marco Conti,et al.  Runtime optimization of IEEE 802.11 wireless LANs performance , 2004, IEEE Transactions on Parallel and Distributed Systems.

[36]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[37]  Paul Ashley,et al.  Wired versus wireless security: the Internet, WAP and iMode for E-commerce , 2001, Seventeenth Annual Computer Security Applications Conference.

[38]  Abbas Jamalipour,et al.  A new explicit loss notification with acknowledgment for wireless TCP , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).

[39]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[40]  Kang G. Shin,et al.  A unified wireless LAN architecture for real-time and non-real-time communication services , 2000, TNET.

[41]  Nitin H. Vaidya,et al.  An energy efficient MAC protocol for wireless LANs , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[42]  Wen-Tsuen Chen,et al.  A MAC Protocol with QoS Guarantee for Multiclass Traffics in Wireless LANs , 2001 .

[43]  J. J. Garcia-Luna-Aceves,et al.  Floor acquisition multiple access (FAMA) for packet-radio networks , 1995, SIGCOMM '95.

[44]  Ness B. Shroff,et al.  Scheduling of real‐time traffic in IEEE 802.11 wireless LANs , 2000, Wirel. Networks.

[45]  Giuseppe Anastasi,et al.  QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis , 2000, Wirel. Networks.

[46]  Kwang-Cheng Chen Medium access control of wireless LANs for mobile computing , 1994 .

[47]  Srikant Sharma,et al.  Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective , 2004, ArXiv.

[48]  Randy H. Katz,et al.  A TRACE-BASEDAPPROACH FOR MODELINGWIRELESS CHANNEL BEHAVIOR , 1996 .

[49]  Shiann-Tsong Sheu,et al.  Design and implementation of a reservation-based MAC protocol for voice/data over IEEE 802.11 ad-hoc wireless networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[50]  Marco Conti,et al.  Design and performance evaluation of an asymptotically optimal backoff algorithm for IEEE 802.11 Wireless LANs , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[51]  Indra Widjaja,et al.  IEEE 802.11 Wireless Local Area Networks , 1997, IEEE Commun. Mag..

[52]  Malathi Veeraraghavan,et al.  Support of voice services in IEEE 802.11 wireless LANs , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[53]  Wen-Tsuen Chen,et al.  An Efficient Multipolling Mechanism for IEEE 802.11 Wireless LANs , 2003, IEEE Trans. Computers.

[54]  Steve Kapp 802.11: Leaving the Wire Behind , 2002, IEEE Internet Comput..

[55]  Yong Guan,et al.  A lightweight authentication protocol for access control in IEEE 802.11 , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[56]  Ruay-Shiung Chang,et al.  A Priority Scheme for IEEE 802. 11 DCF Access Method , 1999 .

[57]  Matthew Mathis,et al.  Forward acknowledgement: refining TCP congestion control , 1996, SIGCOMM '96.

[58]  Sin-Chong Park,et al.  Modified Backoff Algorithm with Station Number Adaptiveness for IEEE 802.11 Wireless LANs , 2003 .

[59]  A. S. Krishnakumar,et al.  Quality-of-service in ad hoc carrier sense multiple access wireless networks , 1999, IEEE J. Sel. Areas Commun..

[60]  Luigi Fratta,et al.  Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[61]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[62]  Guido Aben,et al.  Net throughput with IEEE 802.11 wireless LANs , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[63]  Bernhard Walke,et al.  IEEE 802.11 Wireless Local Area Networks , 2006 .

[64]  Sandor Vincze How Secure Personal Mobility Can Be? , 2003, ICCSA.

[65]  John N. Tsitsiklis,et al.  Introduction to Probability , 2002 .

[66]  Wen-Tsuen Chen,et al.  An adaptive retransmission scheme with QoS support for the IEEE 802.11 MAC enhancement , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).

[67]  Yu-Chee Tseng,et al.  Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks , 2003, Comput. Networks.

[68]  Carla-Fabiana Chiasserini,et al.  Improving TCP over wireless through adaptive link layer setting , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[69]  Sandra Kay Miller Facing the Challenge of Wireless Security , 2001, Computer.

[70]  Adam Wolisz,et al.  Analyzing the RTS / CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs , 1995 .

[71]  Rajesh Krishnan,et al.  Explicit transport error notification (ETEN) for error-prone wireless and satellite networks , 2004, Comput. Networks.

[72]  Haoli Wang,et al.  An enhanced one-bit identity authentication protocol for access control in IEEE 802.11 , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[73]  Kee Chaing Chua,et al.  A Capacity Analysis for the IEEE 802.11 MAC Protocol , 2001, Wirel. Networks.

[74]  Tsugunao Kobayashi TCP Performance over IEEE 802.11 Based Multichannel MAC Protocol for Mobile Ad Hoc Networks , 2003 .

[75]  William A. Arbaugh,et al.  An empirical analysis of the IEEE 802.11 MAC layer handoff process , 2003, CCRV.

[76]  Marco Conti,et al.  A Distributed Mechanism for Power Saving in IEEE 802.11 Wireless LANs , 2001, Mob. Networks Appl..

[77]  Sally Floyd,et al.  Simulation-based comparisons of Tahoe, Reno and SACK TCP , 1996, CCRV.