DocumentCode :
1735856
Title :
Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodes
Author :
Soryal, Joseph ; Xijie Liu ; Saadawi, Tarek
Author_Institution :
Electr. Eng. Dept., City Univ. of New York, New York, NY, USA
fYear :
2013
Firstpage :
1
Lastpage :
4
Abstract :
All smartphones and tablets are currently equipped with Network Interface Cards (NIC) that use IEEE 802.11 family to access Wi-Fi networks or communicate in a peer-to-peer model, which is the topic of this paper. This paper presents a novel technique to detect and isolate a rogue user that modified the firmware on the device´s NIC card to capture the channel either to disrupt the communication or to illegally increase its own node throughput in a wireless network with hidden nodes present at the expense of other nodes in the network. The attacker modifies the NIC (Network Card Interface) firmware that is using IEEE 802.11 DCF to deviate from the normal back-off mechanism specified by the IEEE standard which significantly increases the successful probabilities of its packet transmissions. The attacker node only backs off one slot every time it has a packet to transmit or when it experiences a collision. As a result, the attacker captures the channel (Bandwidth) and prevents others from sharing the bandwidth. The attacker forces the NIC to have a firmware upgrade that contains the malicious code. The proposed algorithm detects the attacker in a network with the presence of hidden nodes. The paper´s main contributions are: a new method to model Markov Chain to account for the hidden nodes´ throughputs, a detection algorithm, and an isolation technique to isolate the attacker.
Keywords :
Markov processes; firmware; network interfaces; peer-to-peer computing; wireless LAN; IEEE 802.11 DCF; IEEE 802.11 family; Markov chain model; NIC firmware; Wi-Fi networks; back-off mechanism; device NIC card; hidden nodes; misbehavior detection algorithm; misbehavior isolation; network interface cards; packet transmission probability; peer-to-peer networks; smartphones; Communication system security; IEEE 802.11 Standards; Markov processes; Monitoring; Peer-to-peer computing; Throughput; Wireless communication; DoS Attack; IEEE 802.11; Markov Chain; Network Security; Smartphones Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy and Security in Mobile Systems (PRISMS), 2013 International Conference on
Conference_Location :
Atlantic City, NJ
Type :
conf
DOI :
10.1109/PRISMS.2013.6927178
Filename :
6927178
Link To Document :
بازگشت