Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks

Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power control has been considered for improving the performance of WLANs. However, we show that, CCA tuning can be exploited by selfish nodes to obtain an unfair share of the available bandwidth. Specifically, a selfish entity can manipulate the CCA threshold to ignore ongoing transmissions; this increases the probability of accessing the medium and provides the entity a higher, unfair share of the bandwidth. We experiment on our 802.11 testbed to characterize the effects of CCA tuning on both isolated links and in 802.11 WLAN configurations. We focus on AP-client(s) configurations, proposing a novel approach to detect this misbehavior. A misbehaving client is unlikely to recognize low power receptions as legitimate packets; by intelligently sending low power probe messages, an AP can efficiently detect a misbehaving node. Our key contributions are: 1) We are the first to quantify the impact of selfish CCA tuning via extensive experimentation on various 802.11 configurations. 2) We propose a lightweight scheme for detecting selfish nodes that inappropriately increase their CCAs. 3) We extensively evaluate our system on our testbed; its accuracy is 95 percent while the false positive rate is less than 5 percent.

[1]  O. Queseth,et al.  The effect of selfish behavior in mobile networks using CSMA/CA , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[2]  Sunghyun Choi,et al.  Analysis of User Behavior and Traffic Pattern in a Large-Scale 802.11a/b Network , 2004 .

[3]  N. Draper,et al.  Applied Regression Analysis: Draper/Applied Regression Analysis , 1998 .

[4]  Jing Zhu,et al.  Adaptive CSMA for Scalable Network Capacity in High-Density WLAN: A Hardware Prototyping Approach , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Christos H. Papadimitriou,et al.  Worst-case Equilibria , 1999, STACS.

[6]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[7]  Samir Ranjan Das,et al.  Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[8]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Jerzy Konorski,et al.  Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.

[10]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[11]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[13]  Konstantina Papagiannaki,et al.  Interference Mitigation Through Power Control in High Density 802.11 WLANs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Kyle Jamieson,et al.  Understanding the real-world performance of carrier sense , 2005, E-WIND '05.

[15]  Bob O'Hara,et al.  The IEEE 802.11 Handbook: A Designer's Companion , 1999 .

[16]  Richard F. Gunst,et al.  Applied Regression Analysis , 1999, Technometrics.

[17]  Michalis Faloutsos,et al.  MDG: measurement-driven guidelines for 802.11 WLAN design , 2007, MobiCom '07.