Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

IEEE 802.11 protocol assumes all the nodes in the network cooperate and adhere to the standard. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources or disrupt network performance. Previously, Kausanaur proposed a Receiver Trusted MAC protocol (REC-TR-MAC) by extending IEEE 802.11 to prevent Medium Access Control (MAC) sender misbehaviours. This protocol trusts the receiving node (Access Point) in a WLAN and enables the Access Point to allocate the MAC protocol random backoff values for wireless clients. Our research investigates MAC layer node misbehaviours in the context of a Public Wireless Hotspot. REC-TR-MAC has been implemented by porting the legacy code-base to the latest ns2. Furthermore, our evaluation has been extended to incorporate several Access Point misbehaviours to simulate the scenario of an untrusted hotspot (misbehaving access point), which has not been investigated much in the literature. In public wireless hotspot the misbehaving wireless senders could run a malware at the Hotspot to gain the access to, alter the MAC protocol operation. The experiment results show that Hotspot misbehaviours significantly affect the network performance, nodes throughput reduced by 50% and misbehaviour detection accuracy by 40%. The results have also been compared with the standard IEEE 802.11 protocol. This evaluation is important to understand the design principles for a reliable MAC protocol which should be resilient against MAC layer misbehaviours. Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks.

[1]  J. S. Shah,et al.  Effect of MAC layer protocol in building trust and reputation scheme in mobile ad hoc network , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).

[2]  Sang Kyu Lee,et al.  Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[4]  Soufiene Djahel,et al.  Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs , 2012, IEEE Wireless Communications Letters.

[5]  Min-Shiang Hwang,et al.  Using Smart Card to Achieve a Single Sign-on for Multiple Cloud Services , 2013 .

[6]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[7]  V. A. Kumar,et al.  Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[8]  BicakciKemal,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009 .

[9]  Chadi Assi,et al.  Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.

[10]  Dimitris Kanellopoulos,et al.  MAC layer misbehavior in MANETs , 2013 .

[11]  Chadi Assi,et al.  Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[12]  John S. Baras,et al.  Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference , 2008, VALUETOOLS.

[13]  Lili Qiu,et al.  Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection , 2010, IEEE Transactions on Dependable and Secure Computing.

[14]  Gunasekaran Raja,et al.  A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks , 2009, Journal of Computer Science and Technology.