Practical Realisation and Validation of aWi-Fi Policing Algorithm

Node misbehavior has attracted much research interest. However, much of the focus of prior research is on detection of node misbehavior, and little work has been done on counteracting that misbehavior. Those who do address this issue lack robustness, flexibility, or feasibility for implementation on real hardware. As the IEEE 802.11 standard’s medium access mechanism is decentralized, stations can potentially refuse to abide by the standard and gain performance benefit at the cost of the performance of compliant stations. In this thesis, we study, extend, and implement a policing algorithm that has been previously introduced for IEEE 802.11 b/g networks, and make it practically feasible for implementation on real hardware. We provide proof that the extended algorithm is robust and can effectively address the problem of policing IEEE 802.11 node misbehavior by eliminating the performance advantage for noncompliant stations. We outline the domain of scenarios this algorithm can be adapted to, and those it is not designed for. To prove the effectiveness of the scheme in a real network, we implement it on real wireless adapters using the OpenFWWF firmware, conduct a wide range of experiments for different network scenarios. We provide results that confirm the extended algorithm’s correct functionality for cases it is designed to support. We also consider the results in light of newer features of IEEE 802.11 standard. We conclude that the extended policing algorithm can in fact force stations to comply with the IEEE 802.11 standard (although some new IEEE 802.11 features may impair its functionality) and its application does not result in network degradation, and it is effective even under undesirable network conditions.

[1]  Basem Shihada,et al.  The efficacy of centralized flow rate control in 802.11-based wireless mesh networks , 2013, EURASIP Journal on Wireless Communications and Networking.

[2]  Giulio Iannello,et al.  Frame dropping: A QoS mechanism for multimedia communications in WiFi hot spots , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.

[3]  Yanghee Choi,et al.  An experimental study on the capture effect in 802.11a networks , 2007, WinTECH '07.

[4]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[5]  David Malone,et al.  Incentivising Fairness and Policing Nodes in WiFi , 2011, IEEE Communications Letters.

[6]  Jia Hao,et al.  Access point centric scheduling for dash streaming in multirate 802.11 wireless network , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[7]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[8]  G. Bianchi,et al.  On the anomalous behavior of IEEE 802 . 11 commercial cards , 2006 .

[9]  Roland de Haan,et al.  Why RTS-CTS is not your ideal wireless LAN multiple access protocol , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  Meikang Qiu,et al.  Jamming ACK Attack to Wireless Networks and a Mitigation Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Oliver W. W. Yang,et al.  Throughput Modeling and Analysis of IEEE 802.11 DCF with Selfish Node , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Chadi Assi,et al.  Modeling and analysis of predictable random backoff in selfish environments , 2006, MSWiM '06.

[13]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[14]  S. Giordano,et al.  IEEE 802.11 b performance evaluation: convergence of theoretical, simulation and experimental results , 2004, 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,.

[15]  Gustavo Gonzalez Granadillo,et al.  Botnets: Lifecycle and Taxonomy , 2011, 2011 Conference on Network and Information Systems Security.

[16]  R. R. Rejimol Robinson,et al.  Evaluation of mitigation methods for distributed denial of service attacks , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).

[17]  David J. Thuente,et al.  Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[18]  A. Benslimane,et al.  Smart Attacks Based on Control Packets Vulnerabilities with IEEE 802.11 MAC , 2008, 2008 International Wireless Communications and Mobile Computing Conference.

[19]  Chong-Ho Choi,et al.  Providing absolute priority and airtime fairness in WLANs , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[20]  R. Lua,et al.  Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.

[21]  Frank Piessens,et al.  Advanced Wi-Fi attacks using commodity hardware , 2014, ACSAC.

[22]  David Malone,et al.  Decentralised learning MACs for collision-free access in WLANs , 2010, Wirel. Networks.

[23]  A. Kamerman,et al.  Microwave oven interference on wireless LANs operating in the 2.4 GHz ISM band , 1997, Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97.

[24]  Weijie Liu,et al.  A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks , 2013, Telecommun. Syst..

[25]  Jihyuk Choi,et al.  Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks , 2010, SecureComm.

[26]  Kai Chen,et al.  Theoretic Analysis of IEEE 802.11 Rate Adaptation Algorithm SampleRate , 2011, IEEE Communications Letters.

[27]  Bin Li,et al.  Saturation throughput analysis of multi-rate IEEE 802.11 wireless networks , 2009, Wirel. Commun. Mob. Comput..

[28]  Cristina Cano,et al.  Learning-BEB: Avoiding Collisions in WLAN , 2008 .

[29]  Michael Bredel,et al.  Understanding Fairness and its Impact on Quality of Service in IEEE 802.11 , 2008, IEEE INFOCOM 2009.

[30]  Yan Grunenberger,et al.  Experimenting With Commodity 802.11 Hardware: Overview and Future Directions , 2015, IEEE Communications Surveys & Tutorials.

[31]  John S. Baras,et al.  Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.

[32]  Soung Chang Liew,et al.  Proportional fairness in wireless LANs and ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[33]  David Malone,et al.  H-RCA: 802.11 Collision-Aware Rate Control , 2013, IEEE/ACM Transactions on Networking.

[34]  Raymond Knopp,et al.  Information capacity and power control in single-cell multiuser communications , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[35]  George C. Polyzos,et al.  TCP and UDP performance over a wireless LAN , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[36]  Thierry Turletti,et al.  IEEE 802.11 rate adaptation: a practical approach , 2004, MSWiM '04.

[37]  Tuomas Sandholm,et al.  Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming , 2014, WiSec '14.

[38]  Bibhudatta Sahoo,et al.  Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method , 2009, 2009 IEEE International Advance Computing Conference.

[39]  Mario Gerla,et al.  How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[40]  Eitan Altman,et al.  New Insights From a Fixed-Point Analysis of Single Cell IEEE 802.11 WLANs , 2007, IEEE/ACM Transactions on Networking.

[41]  Jean C. Walrand,et al.  Design and Analysis of an Asynchronous Zero Collision MAC Protocol , 2008, ArXiv.

[42]  Kang G. Shin,et al.  Achieving efficient channel utilization and weighted fairness for data communications in IEEE 802.11 WLAN under the DCF , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).

[43]  Martin Heusse,et al.  Fairness and its impact on delay in 802.11 networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[44]  Kang G. Shin,et al.  An Experimental Approach to Spectrum Sensing in Cognitive Radio Networks with Off-the-Shelf IEEE 802.11 Devices , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[45]  D. Malone,et al.  Evaluation of the backoff procedure of Homeplug MAC vs. DCF , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[46]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[47]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[48]  Chris McDonald Converged Networking: Data and Real-time Communications over IP (IFIP International Federation for Information Processing) , 2003 .

[49]  Vaduvur Bharghavan,et al.  Achieving MAC layer fairness in wireless packet networks , 2000, MobiCom '00.

[50]  Jean-Yves Le Boudec,et al.  Rate adaptation, Congestion Control and Fairness: A Tutorial , 2000 .

[51]  Y. Murat Erten,et al.  A layered security architecture for corporate 802.11 wireless networks , 2004, 2004 Symposium on Wireless Telecommunications.

[52]  Leo Monteban,et al.  WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.

[53]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[54]  Periklis Chatzimisios,et al.  Effectiveness of RTS/CTS handshake in IEEE 802.11a Wireless LANs , 2004 .

[55]  Younghwan Yoo,et al.  Airtime Fairness for IEEE 802.11 Multirate Networks , 2008, IEEE Transactions on Mobile Computing.

[56]  Luca Vollero,et al.  Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.

[57]  Marc Portoles-Comeras,et al.  IEEE 802.11 downlink traffic shaping scheme for multi-user service enhancement , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[58]  Moustafa Youssef,et al.  A framework for wireless LAN monitoring and its applications , 2004, WiSe '04.

[59]  Neeraj Jaggi,et al.  MAC layer misbehavior effectiveness and collective aggressive reaction approach , 2010, 2010 IEEE Sarnoff Symposium.

[60]  Kensuke Fukuda,et al.  The impact and implications of the growth in residential user-to-user traffic , 2006, SIGCOMM 2006.

[61]  Dong Zhou,et al.  A scalable and adaptive clock synchronization protocol for IEEE 802.11-based multihop ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[62]  N. Yazdani,et al.  Service differentiation and fairness in IEEE 802.11 DCF , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[63]  Sang Kyu Lee,et al.  Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[64]  Douglas J. Leith,et al.  Thwarting Selfish Behavior in 802.11 WLANs , 2013, IEEE/ACM Transactions on Networking.

[65]  Seungjoon Lee,et al.  Maranello: Practical Partial Packet Recovery for 802.11 , 2010, NSDI.

[66]  Hari Balakrishnan,et al.  An analysis of short-term fairness in wireless media access protocols (poster session) , 2000, SIGMETRICS '00.

[67]  Khaled Hatem Almotairi Inverse Binary Exponential Backoff: Enhancing Short-term Fairness for IEEE 802.11 Networks , 2013, ISWCS.

[68]  Santosh Biswas,et al.  Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization , 2014, International Journal of Machine Learning and Cybernetics.

[69]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[70]  Kang G. Shin,et al.  A Lightweight Passive Online Detection Method for Pinpointing Misbehavior in WLANs , 2011, IEEE Transactions on Mobile Computing.

[71]  Weihua Zhuang,et al.  An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[72]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[73]  David Malone,et al.  Practical node policing in 802.11WLANs , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[74]  Albert Banchs,et al.  Detecting selfish configurations in 802.11 WLANs , 2010, IEEE Communications Letters.

[75]  David Malone,et al.  WiFo: A diagnostic tool for IEEE 802.11 MAC , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[76]  Qiu Qiang,et al.  MAC protocol enhancements for QoS guarantee and fairness over the IEEE 802.11 wireless LANs , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[77]  Jerzy Konorski,et al.  Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting , 2001, PROMS.

[78]  Ilenia Tinnirello,et al.  Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[79]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[80]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[81]  Soung Chang Liew,et al.  Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks , 2008, IEEE Transactions on Mobile Computing.

[82]  Soufiene Djahel,et al.  Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs , 2012, IEEE Wireless Communications Letters.

[83]  John S. Baras,et al.  Detection and prevention of MAC layer misbehavior in ad hoc networks , 2004, SASN '04.

[84]  Tim Moors,et al.  Fairness and capacity trade-off in IEEE 802.11 WLANs , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[85]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[86]  C. Chellappan,et al.  A mitigation model for TCP SYN flooding with IP spoofing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[87]  Marcel Dischinger,et al.  The local and global effects of traffic shaping in the internet , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[88]  Sridhar Iyer,et al.  Mitigating the exposed node problem in IEEE 802.11 ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[89]  John V. Guttag,et al.  Time-based Fairness Improves Performance in Multi-Rate WLANs , 2004, USENIX Annual Technical Conference, General Track.

[90]  Trong-Minh Hoang,et al.  An analytical model for estimating the impact of MAC layer misbehavior in IEEE 802.11 networks , 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[91]  David Malone,et al.  Exploiting the capture effect to improve WLAN throughput , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[92]  Brahim Bensaou,et al.  On max-min fairness and scheduling in wireless ad-hoc networks: analytical framework and implementation , 2001, MobiHoc.

[93]  David Malone,et al.  Mitigating collisions through power-hopping to improve 802.11 performance , 2014, Pervasive Mob. Comput..

[94]  Michael G. Barry,et al.  Supporting service differentiation in wireless packet networks using distributed control , 2001, IEEE J. Sel. Areas Commun..

[95]  Srikanth V. Krishnamurthy,et al.  Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks , 2012, IEEE Transactions on Mobile Computing.

[96]  Jaume Barceló,et al.  Prototyping Distributed Collision-Free MAC Protocols for WLANs in Real Hardware , 2013, MACOM.

[97]  Xuemin Shen,et al.  Maintaining Utility Fairness Using Weighting Factors in Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[98]  JongWon Kim,et al.  Active capture of wireless traces: overcome the lack in protocol analysis , 2008, WiNTECH '08.

[99]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[100]  Yunbae Kim,et al.  Design and Analysis of Medium Access Protocol: Throughput and Short-Term Fairness Perspective , 2015, IEEE/ACM Transactions on Networking.

[101]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[102]  Andrzej Duda,et al.  Understanding the Performance of 802.11 Networks , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[103]  Ilenia Tinnirello,et al.  On the fidelity of IEEE 802.11 commercial cards , 2005, First International Conference on Wireless Internet (WICON'05).

[104]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[105]  Thierry Turletti,et al.  Performance analysis under finite load and improvements for multirate 802.11 , 2005, Comput. Commun..

[106]  Paul Barford,et al.  Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.

[107]  Ilenia Tinnirello,et al.  Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.

[108]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[109]  Kate Ching-Ju Lin,et al.  On Exploiting Spatial-Temporal Uncertainty in Max-Min Fairness in Underwater Sensor Networks , 2010, IEEE Communications Letters.

[110]  Ilenia Tinnirello,et al.  Temporal fairness provisioning in multi-rate contention-based 802.11e WLANs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[111]  A. W. Rix,et al.  Quality VoIP — An Engineering Challenge , 2001 .

[112]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[113]  Christoph Neumann,et al.  An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[114]  Szymon Szott,et al.  Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..

[115]  C. Vlachou,et al.  Fairness of MAC protocols: IEEE 1901 vs. 802.11 , 2013, 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications.

[116]  Suman Banerjee,et al.  Airshark: detecting non-WiFi RF devices using commodity WiFi hardware , 2011, IMC '11.

[117]  Hyunsoo Yoon,et al.  Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11 , 2010, IEEE Transactions on Vehicular Technology.

[118]  Vincenzo Mancuso,et al.  A Survey on Opportunistic Scheduling in Wireless Communications , 2013, IEEE Communications Surveys & Tutorials.

[119]  Guillem Femenias,et al.  A refined 3D Markov model for non-saturated IEEE 802.11 DCF netwoks , 2013, 2013 IFIP Wireless Days (WD).

[120]  David Malone,et al.  Policing 802.11 MAC Misbehaviours , 2013, IEEE Transactions on Mobile Computing.

[121]  Sagar Naik,et al.  A new fairness index for radio resource allocation in wireless networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[122]  Thierry Turletti,et al.  Saturation throughput analysis of error-prone 802.11 wireless networks: Research Articles , 2005 .

[123]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[124]  Ilenia Tinnirello,et al.  An experimental testbed and methodology for characterizing IEEE 802.11 network cards , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[125]  David Malone,et al.  Modeling the 802.11 distributed coordination function in non-saturated conditions , 2005, IEEE Communications Letters.

[126]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[127]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[128]  Leandros Tassiulas,et al.  Achieving proportional fairness using local information in Aloha networks , 2004, IEEE Transactions on Automatic Control.

[129]  Ilenia Tinnirello,et al.  MAClets: active MAC protocols over hard-coded devices , 2012, CoNEXT '12.

[130]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[131]  Carla-Fabiana Chiasserini,et al.  Smart traffic scheduling in 802.11 WLANs with access point , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[132]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[133]  Héctor L. Velayos Munoz,et al.  Performance measurements of the saturation throughput in IEEE 802.11 access points , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[134]  Giulio Iannello,et al.  ACKS: a technique to reduce the impact of legacy stations in 802.11e EDCA WLANs , 2005, IEEE Communications Letters.

[135]  Kameswari Chebrolu,et al.  Design and evaluation of a new MAC protocol for long-distance 802.11 mesh networks , 2005, MobiCom '05.

[136]  Anja Klein,et al.  Practical OFDMA in wireless networks with multiple transmitter-receiver pairs , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[137]  Douglas J. Leith,et al.  Proportional Fairness in 802.11 Wireless LANs , 2011, IEEE Communications Letters.