DoS detection in IEEE 802.11 with the presence of hidden nodes
نویسندگان
چکیده
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
منابع مشابه
Special issue on “Cyber Security”
After careful reviewing and emphasizing the recent advances in information assurance and network security, this special issue of the Cairo University Journal of Advanced Research, an Elsevier publications, contains three parts with total of nine papers; part I addresses network security, part II focuses on software and applications security, while part III discusses cyber infrastructure protect...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملTurning Hidden Nodes into Helper Nodes in IEEE 802.11 Wireless LAN Networks
To enhance the performance of IEEE 802.11 WLANs in the presence of hidden terminal problem, we propose a protocol that allows non-hidden stations to help each other retransmit faster whenever possible. Opposite to other approaches, the new protocol benefits from the hidden terminal problem to improve the performance of DCF, which is the basic operation of IEEE 802.11. The new protocol is compat...
متن کاملThorough Analysis of IEEE 802.11 EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes
In this paper the authors present a simulation study of five different ring networks with hidden and exposed nodes in which the IEEE 802.11 EDCA function is used as the MAC protocol. The presented analysis is crucial for understanding how the theoretically simple ring topology can be degraded by the presence of hidden and exposed nodes. Configurations with equal and mixed priorities are conside...
متن کاملPer-node throughput and fairness analysis of IEEE 802.11 wireless networks with hidden nodes
This work seeks to develop an analytical model for the per-node throughput analysis of IEEE 802.11 WLAN networks with hidden nodes by extending Bianchi’s model. With the analytic model we derive the per-node throughput of each node and quantify the impact of hidden nodes on per-node throughput. Through our analysis, we find that nodes having more hidden nodes are likely to have worse throughput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 5 شماره
صفحات -
تاریخ انتشار 2014