DocumentCode :
3716743
Title :
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots
Author :
Chaminda Alocious;Hannan Xiao;Bruce Christianson;James Malcolm
Author_Institution :
Sch. of Comput. Sci., Univ. of Hertfordshire, Hatfield, UK
fYear :
2015
Firstpage :
1853
Lastpage :
1860
Abstract :
IEEE 802.11 protocol assumes all the nodes in the network cooperate and adhere to the standard. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources or disrupt network performance. Previously, Kausanaur proposed a Receiver Trusted MAC protocol (REC-TR-MAC) by extending IEEE 802.11 to prevent Medium Access Control (MAC) sender misbehaviours. This protocol trusts the receiving node (Access Point) in a WLAN and enables the Access Point to allocate the MAC protocol random backoff values for wireless clients. Our research investigates MAC layer node misbehaviours in the context of a Public Wireless Hotspot. REC-TR-MAC has been implemented by porting the legacy code-base to the latest ns2. Furthermore, our evaluation has been extended to incorporate several Access Point misbehaviours to simulate the scenario of an untrusted hotspot (misbehaving access point), which has not been investigated much in the literature. In public wireless hotspot the misbehaving wireless senders could run a malware at the Hotspot to gain the access to, alter the MAC protocol operation. The experiment results show that Hotspot misbehaviours significantly affect the network performance, nodes throughput reduced by 50% and misbehaviour detection accuracy by 40%. The results have also been compared with the standard IEEE 802.11 protocol. This evaluation is important to understand the design principles for a reliable MAC protocol which should be resilient against MAC layer misbehaviours. Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks.
Keywords :
"Media Access Protocol","Receivers","IEEE 802.11 Standard","Communication system security","Wireless networks"
Publisher :
ieee
Conference_Titel :
Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/CIT/IUCC/DASC/PICOM.2015.276
Filename :
7363322
Link To Document :
بازگشت