Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks

Carrier-sensing multiple-access with collision avoidance (CSMA/CA)-based networks, such as those using the IEEE 802.11 distributed coordination function protocol, have experienced widespread deployment due to their ease of implementation. The terminals accessing these networks are not owned or controlled by the network operators (such as in the case of cellular networks) and, thus, terminals may not abide by the protocol rules in order to gain unfair access to the network (selfish misbehavior), or simply to disturb the network operations (denial-of-service attack). This paper presents a robust nonparametric detection mechanism for the CSMA/CA media-access control layer denial-of-service attacks that does not require any modification to the existing protocols. This technique, based on the -truncated sequential Kolmogorov-Smirnov statistics, monitors the successful transmissions and the collisions of the terminals in the network, and determines how ldquoexplainablerdquo the collisions are given for such observations. We show that the distribution of the explainability of the collisions is very sensitive to changes in the network, even with a changing number of competing terminals, making it an excellent candidate to serve as a jamming attack indicator. Ns-2 simulation results show that the proposed method has a very short detection latency and high detection accuracy.

[1]  Κουκουβακης Ε. Γεωργιος Σχεδιασμος Και Υλοποιηση Μοντελου Εξομοιωσης Υπερκειμενων Δικτυων Με Χρηση Του Εργαλειου Network Simulator 2 , 2003 .

[2]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[3]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[4]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[5]  Saurabh Ganeriwal,et al.  On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Rohit Negi,et al.  DoS analysis of reservation based MAC protocols , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[7]  Mithun Acharya,et al.  Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .

[8]  F. A. Seiler,et al.  Numerical Recipes in C: The Art of Scientific Computing , 1989 .

[9]  Harry J. Khamis,et al.  The two-stage i -corrected Kolmogorov-Smirnov test , 2000 .

[10]  Xiaodong Wang,et al.  Batch and Sequential Bayesian Estimators of the Number of Active Terminals in an IEEE 802.11 Network , 2007, IEEE Transactions on Signal Processing.

[11]  J. Baras,et al.  Incentive compatible medium access control in wireless networks , 2006, GameNets '06.

[12]  Stephen B. Wicker,et al.  Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..

[13]  William H. Press,et al.  The Art of Scientific Computing Second Edition , 1998 .

[14]  Xiaodong Wang,et al.  Adaptive Optimization of IEEE 802.11 DCF Based on Bayesian Estimation of the Number of Competing Terminals , 2006, IEEE Transactions on Mobile Computing.

[15]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .

[16]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[18]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.

[19]  Stephen B. Wicker,et al.  Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  B. Issac,et al.  DoS attacks and defense mechanisms in wireless networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[21]  Bo Li,et al.  A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF , 2004, IEEE Trans. Veh. Technol..

[22]  Ilenia Tinnirello,et al.  Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Robert B. Ash,et al.  Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.

[24]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[25]  M. Hall,et al.  Effect of pulse jamming on IEEE 802.11 wireless LAN performance , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[26]  William H. Press,et al.  Book-Review - Numerical Recipes in Pascal - the Art of Scientific Computing , 1989 .

[27]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[28]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[29]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[30]  Xiaodong Wang,et al.  Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks , 2008, 2008 IEEE International Conference on Communications.

[31]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[32]  Mithun Acharya,et al.  Intelligent Jamming Attacks , Counterattacks and ( Counter ) 2 Attacks in 802 . 11 b Wireless Networks , 2005 .

[33]  Harry J. Khamis,et al.  The δ-corrected Kolmogorov-Smirnov test for goodness of fit , 1990 .