A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs

نویسندگان

  • Eduard Garcia Villegas
  • Muhammad Shahwaiz Afaqui
  • Elena López-Aguilera
چکیده

The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from the fact that beacon frames are always given preference in IEEE 802.11 networks. An analytical model to define the aforementioned metric is presented and evaluated with experiments and simulations. Furthermore, we evaluate the adversary detection capabilities of our scheme by means of simulations and experiments over a real testbed. The simulation and experimental results indicate consistency and both are found to follow the trends indicated in the analytical model. Measurement results indicate that our scheme is able to correctly detect a malicious entity at a distance of, at least, 120m. Analytical, simulation and experimental results signify the validity of our scheme and highlight the fact that our scheme is both efficient and successful in detecting an adversary (either a jammer or a cheating device). As a proof of concept, we developed an application that when deployed at the IEEE802.11 Access Point, is able to effectively detect an adversary. c ⃝ 2014 Eduard Garcia-Villegas under Creative Commons (CC BY-NC-ND)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

An SSCOP-based link layer protocol for wireless LANs

—The IEEE 802.11 standard provides fast recovery from frame losses using a rapid link level positive acknowledgment scheme. However, the adoption of positive acknowledgment leads to inefficient frame transmission. To improve efficiency of the acknowledgments mechanism in IEEE 802.11, we propose a novel link layer protocol for wireless LANs. The proposed protocol is an adaptation of an ATM-based...

متن کامل

Comparison of IEEE 802.3 & IEEE802.11 MAC Protocol EEET1149 LOCAL AND METROPOLITAN AREA NETWORKS LECTURER:

The IEEE 802.3 and 802.11 standards are used to define CSMA/CD (Carrier Sense Multiple Access with Collision Detection) based on the Ethernet LAN (Local Area Networks) and Wireless LAN (WLAN) protocol, respectively. This report deals with the comparison of IEEE 802.3 and IEEE802.11 MAC protocol in terms of the physical and medium access control (MAC) layer. CSMA/CD Ethernet-based protocol is th...

متن کامل

An Optimization Scheme for the IEEE 802.11 Link-Layer Handoff Process

A growing number of IEEE 802.11-based wireless LANs have been set up in many public places in the recent years. These wireless LANs provide convenient network connectivity to users. Although mobile nodes allowed roaming across wireless LANs, handoff latency becomes an obstacle when mobile nodes migrate between different IP networks. Advanced, the link-layer handoff process disrupts the associat...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 86  شماره 

صفحات  -

تاریخ انتشار 2015