Figure 14 - uploaded by Mi Kyung Han
Content may be subject to copyright.
Detecting greedy receivers. 

Detecting greedy receivers. 

Source publication
Conference Paper
Full-text available
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more band-width at the expense of other users. Such misbehaviors threaten the performance and availability of hotspot networks, and have recently attracted increasing research attention. However the ex...

Context in source publication

Context 1
... and normal receiver have BER= 2 e . TCP sender at remote site: So far we consider the connections span only wireless links. Next we consider the case where the two connections span both wireless and wireline links, as shown in Fig. 11(a). We vary the wired link latency from 2 ms to 400 ms , and set BER of both wireless links to 2 e − 5 . Fig. 11 compares goodput under no greedy receiver versus under one greedy receiver ( R 2 is a greedy receiver in this case). We observe that increasing wireline latency initially increases the gap between the normal and greedy receiver. This is because an increasing wireline latency makes end- to-end loss recovery more expensive. When the wireline latency is beyond 200 ms , the goodput of greedy receiver starts to decrease, even though it still significantly out-performs the normal receiver. This is because TCP ACK-clocking reduces its goodput as delay increases, and the goodput gain from the normal receiver is not enough to offset such drop. For misbehavior 3, a greedy receiver sends an ACK even upon receiving a corrupted data frame. This misbehavior is effective when the greedy receiver uses UDP, and the source and the destination address in the corrupted DATA frame are preserved. As shown in Table 1, this is quite common. We create data loss using one of the following two ways. We disable RTS- CTS exchange and place two receivers next to each other and senders far apart from each other to create the hidden terminal problem. Alternatively, we create loss by injecting random loss of bit-error-rate (BER) of 2 e − 5 when the two sender-receiver pairs are within communication range of each other. In both cases, the two flows experience similar loss rates. Vary greedy percentage: As shown in Fig. 12, an increasing greedy percentage increases the discrepancy Next we evaluate the performance impact of greedy receivers in a testbed consisting of 4 DELL Dimensions 1100 PCs (2.66 GHz Intel Celeron D Processor 330 with 512 MB of memory). They form two senders and two receivers. The locations of the nodes are fixed, on the same floor of an office building. Each node runs Fedora Core 4 Linux, and is equipped with 802.11 a/b/g Net- Gear WAG511 using MadWiFi. In our experiment, we enable RTS/CTS, and use a fixed 6 Mbps as MAC-layer data rate. 802.11a is used in our testbed experiments to avoid interference with campus 802.11b wireless LAN in the building. Our testbed evaluation focuses on misbehavior 1, since MadWiFi currently does not allow us to implement the other two misbehaviors. Given the trend of moving more functionalities to software, this is not an inherent constraint. We implement misbehavior 1 as follows. Because the current MadWiFi does not allow us to directly modify NAV in CTS frames, we get around this problem by implementing RTS inflation on one of the senders. We increase RTS NAV to 32700 μs . This automatically triggers inflated NAV in CTS frames. (The inflated CTS NAV is 32655 μs .) Since we want to study the impact of a greedy receiver, we have the sender transmit at lowest power so that its RTS with inflated NAV is not overheard by the other sender and receiver. Only the CTS frames from the greedy receiver is heard by all the other nodes to effectively create greedy receiver misbehavior. Table 3 compares the goodput under 0, 1, or 2 greedy receivers. The reported goodput is median over 5 runs, where each run lasts 2 minutes. As it shows, without greedy receiver, both receivers get similar goodput. When only one receiver is greedy, the greedy receiver gets virtually all the bandwidth and starves the normal receiver. When both receivers are greedy, the one transmitting earlier dominates the medium and starves the other receiver. These results are consistent with simulation results, and confirm the serious damage of greedy misbehavior in real networks. In this section, we present techniques to detect and mitigate greedy receiver misbehaviors. We assume that senders are well-behaving and do not collude with greedy receivers. Fig. 14 shows a flow-chart of our countermeasure scheme. The scheme can be imple- mented at any node in the network, including APs and clients. The more nodes implementing the detection scheme, the higher likelihood of detection. Next we describe how to detect inflated NAV, spoofed ACKs, and fake ACKs. Inflated NAV affects two sets of nodes: (i) those within communication range of the sender and receiver, and (ii) those outside the communication range of the sender but within communication range of the receiver. The first set of nodes know the correct NAV, since they overhear the sender’s frame and can directly compute the correct NAV from the receiver by subtracting the duration of sender’s frame. Therefore these nodes can directly detect and correct inflated NAV. The second set of nodes can infer an upperbound on a receiver’s NAV using the maximum data frame size ( e.g. , 1500 bytes, Ethernet MTU). If the NAV in CTS or ACK exceeds the expected NAV value, greedy receiver is detected. (In fact, without fragmentation, NAV in ACK should always be 0.) We can further locate the greedy receiver using received signal strength measurement from it. To recover from this misbehavior, nodes will ignore the inflated NAV and replace it with the expected NAV to use for virtual carrier sense. To detect greedy receivers that spoof ACKs on behalf of normal receivers, we use their received signal strength. More specifically, let RSS N denote the received signal strength from the original receiver, RSS C denote the received signal strength in the current ACK frame, and T hresh cap denote the capture threshold. RSS N can be obtained using a TCP ACK from that receiver, assuming TCP ACK is not spoofed If RSS is significantly different from RSS N , the sender reports greedy misbehavior. Furthermore, when RSS N ≥ RSS C T hresh cap , the sender can directly recover from this misbehavior by ignoring the received ACK. This is because in this case the original receiver must have not received data and sent ACK, otherwise the ACK coming from the original receiver would have captured the spoofed ACK; ignoring such MAC-layer ACKs allow the sender to retransmit the data at the MAC-layer as it should. To examine the feasibility of using RSS measurements for detecting spoofed ACKs, we collect RSSI measurements from our testbed, consisting of 16 nodes spread over one floor of an office building. Our measurements show that around 95% RSSI measurements differ from median RSSI of that link by no more than 1 dB. This suggests that RSSI does not change much during a short time interval, and we can use large change in RSSI to identify spoofed ACKs. Based on the above observation, a sender determines a spoofed ACK if | RSSI median − RSSI curr | > RSSIT hresh , where RSSI median is the median RSSI from the true receiver, RSSI curr is the RSSI of the current frame, and RSSIT hresh is the threshold. The accuracy of detection depends on the value of RSSIT hresh . Fig. 15 plots the false positive and false negative rates as RSSIT hresh varies from 0 to 5 dB , where false positive is how often the sender determines it is a spoofed ACK but in fact it is not, and false negative is how often the sender determines it is not a spoofed ACK but in fact it is. As it shows, using 1 dB as the threshold achieves both low false positive and low false negative rates. The previous detection is effective when RSSI from N R is relatively stable and RSSI from GR is different from N R . To handle highly mobile clients, which experience large variation in RSSI, the sender can use a cross-layer approach to detect the greedy behavior. For each TCP flow, it maintains a list of recently received MAC-layer ACK and TCP ACK. Greedy receiver is detected when TCP often retransmits the packet for which MAC-layer ACK has been received. This detection assumes wireline loss rate is much smaller than wireless loss rate, which is generally the case. To detect greedy receivers that send MAC-layer ACKs even for corrupted frame, the sender compares the MAC-layer loss with the application layer loss rate. The latter can be estimated using active probing (e.g., ping). Since packets are corrupted, GR cannot send ping response and we can measure the true application loss rate. If loss rate is mainly from wireless link, applicationLoss ≈ M ACLoss maxRetries , when packet losses are independent. If applicationLoss > M ACLoss maxRetries + threshold , the sender detects faked ACKs, where threshold is used to tolerate loss rate on wireline links when the connection spans both wireless and wireline. The appropriate value of threshold depends on the loss rate on the wireline links. We implement in NS-2 the greedy receiver countermeasure (GRC) against inflated NAV and ACK spoofing described in Section ...

Similar publications

Article
Full-text available
The evaluation is performed in the attempt to improve link availability and transmission quality of BWA (Broadband Wireless Access) systems, and to achieve an efficient use of radio resources. We have analysed and compared the physical and link layer performance for two common standards: the IEEE 802.16 WMAN-SC and the IEEE 802.11 (a, b, g) WLAN. T...

Citations

... Also, injecting a fake acknowledgement (ACK) when a data frame is lost can trick the sender in believing that the data frame is transmitted successfully and no retransmission is needed. This attack was designed to increase the throughput of some desired senders [11] . An ACK is a control frame that is sent by a receiver to a sender to inform that the data frame is successfully received. ...
... (1) While the 802.11 standard allows for channel NAV durations of up to 32ms, off-the-shelf devices may only allow for a shorter limit as a precaution against NAV flooding attacks [37]. For example, the 802.11ac standard allows up to 5.5ms of aggregated frame transmissions [38], and valid 802.11ac ...
Thesis
Wireless operators face an ever-growing challenge to meet the throughput and processing requirements of billions of devices that are getting connected. In current wireless networks, such as LTE and WiFi, these requirements are addressed by provisioning more resources: spectrum, transmitters, and baseband processors. However, this simple add-on approach to scale system performance is expensive and often results in resource underutilization. What are, then, the ways to efficiently scale the throughput and operational efficiency of these wireless networks? To answer this question, this thesis explores several potential designs: utilizing unlicensed spectrum to augment the bandwidth of a licensed network; coordinating transmitters to increase system throughput; and finally, centralizing wireless processing to reduce computing costs. First, we propose a solution that allows LTE, a licensed wireless standard, to co-exist with WiFi in the unlicensed spectrum. The proposed solution bridges the incompatibility between the fixed access of LTE, and the random access of WiFi, through channel reservation. It achieves a fair LTE-WiFi co-existence despite the transmission gaps and unequal frame durations. Second, we consider a system where different MIMO transmitters coordinate to transmit data of multiple users. We present an adaptive design of the channel feedback protocol that mitigates interference resulting from the imperfect channel information. Finally, we consider a Cloud-RAN architecture where a datacenter or a cloud resource processes wireless frames. We introduce a tree-based design for real-time transport of baseband samples and provide its end-to-end schedulability and capacity analysis. We also present a processing framework that combines real-time scheduling with fine-grained parallelism. The framework reduces processing times by migrating parallelizable tasks to idle compute resources, and thus, decreases the processing deadline-misses at no additional cost. We implement and evaluate the above solutions using software-radio platforms and off-the-shelf radios, and confirm their applicability in real-world settings.
... John Bellardo et al. also found that the virtual carrier sense attack is much harder to defend when compared to 802.11 MAC deauthentication attack. According to Mi Kyung Han et al. [12], it is possible to increase the NAV up to 32767 microseconds (15 bits for duration), which is the maximum allowable value in IEEE 802.11, then sending control frames with inflated NAV will allow a greedy receiver to silence all nearby communication until the communication of greedy receiver is completed. In this paper, we perform a detailed analysis of RTS/CTS attack which exploits the medium reservation mechanism of wireless networks through duration field. ...
Conference Paper
Denial-of-Service attacks (DoS) have become a widespread problem on the Internet. These attacks are easy to execute. Low rate attacks are relatively new variants of DoS attacks. Low rate DoS attacks are difficult to detect since attacker sends attack stream with low volume and the countermeasures used to handle the high rate DoS attacks are not suitable for these types of attacks. RTS/CTS attack is one type of Low rate DoS attack. In this paper, we analyze RTS/CTS attack which exploits the medium reservation mechanism of 802.11 networks through duration field. We propose variants of RTS/CTS attacks in wireless networks. We simulate the attacks behaviour in ns2 simulation environment to demonstrate the attack feasibility as well as potential negative impact of these attacks on 802.11 based networks. We have created an application that has the capability to create test bed environment for the attacks, perform RTS/CTS attacks and generate suitable graphs to analyze the attack's behaviour. We also briefly discuss possible ways of detecting and mitigating such Low rate DoS attacks in wireless networks.
... Since according to the IEEE 802.11 standard, when a station receives a RTS control frame, it has to answer by sending CTS control frame. This can propagate the attack and give the attacker more chance to have a successful attack [10][11][12] . ...
Article
Full-text available
Problem statement: Wireless Local Areas (WLANs) are subject to different types of vulnerabilities. Denial of Service (DoS) attack is the most current challenging issue on the WLANs. The objectives of the study were to (i) Provide an empirical analysis to conduct a series of wireless virtual carrier sense DoS attacks using wireless control frames vulnerabilities, (ii) Design a testbed to compared and analyzed the damage that these attacks can imposed on wireless networks, and (iii) Evaluated the effectiveness of such attacks on performance of WLAN in term of data transmission rate. Approach: The testbed employed ubuntu distribution along a network analyzer, Atheros chipset, and frame injection to the tested WLAN. All experiments were placed on two phases: Targeting wireless access point and targeting wireless client. Each phase presented the results of experiments under three circumstances: Before, during, and after the attacks. Results: Even when virtual carrier sense communication was disabled in the tested WLAN, still the target nodes answered to these forgery frames which made the attacks easier. Attacks over the wireless clients were more effective than the access point. In VCS-RTS-C the rate of data transmission from 3547.384 B sec-1 decreased to 9.185 B sec-1. In contrast with VCS-CTS-C, it decreased from 4959.887-44.740 B sec-1 and amount of decrease for VCS-ACK-C was from 7057.401-136.96 B sec-1. The obtained results demonstrated that during the attacks the target clients were completely disconnected from the wireless network and unable to do any communication. Conclusion: The influence of wireless virtual carrier sense attacks on performance of the wireless network was analyzed. The data transmission rate of the tested WLAN under the attacks was compared with the transmission rate of the WLAN operated under normal conditions. The obtained results confirmed the attacks could easily overwhelmed and shut down the wireless network.
... Since according to the IEEE 802.11 standard, when a station receives a RTS control frame, it has to answer by sending CTS control frame. This can propagate the attack and give the attacker more chance to have a successful attack [10][11][12] . ...
Article
Full-text available
Large deployments of access points in wireless local area networks (WLANs) based on the IEEE 802.11 standard require management, configuration and control mechanisms. Centralized WLANs are defined as multi-cell wireless access networks that implement some of these functions in a centralized manner. In this chapter the authors illustrate how the mechanisms designed for the management of centralized WLANs can also be used for monitoring parameters related to QoS support and for pursuing QoS goals. They describe the Control and Provisioning Wireless Access Protocol (CAPWAP), a recent IETF standard for the management of centralized WLANs which is currently in the final stages of the definition process, its implementation for the existing types of centralized WLANs, and its use for monitoring and QoS management. The authors discuss the QoS goals that can be pursued in this framework, such as access control, load balancing, cell resizing, and Medium Access Control parameters adaptation, as well as the algorithms and strategies that can be used to fulfill them.
Article
Full-text available
Detecting misbehaving users in wireless networks is an important problem that has been drawing considerable attention. Even though there is a plethora of work on 802.11 wireless local area networks (WLANs), most existing schemes employ behavior-based anomaly detection, assuming that the backoff-time information of each transmitting node is available to the monitoring node. Unfortunately, it is practically infeasible to obtain the accurate backoff value chosen by other transmitting nodes because this MAC-layer information is not readily available. In this paper, we propose a practical way of pinpointing the misbehaving nodes without requiring access of hardware-level (e.g., backoff time) information in 802.11 WLANs. In contrast to most prior work, our scheme exploits the sequence of successfully received packets, which are readily observable at the access point. The distinct features of our scheme are that it 1) promptly detects a misbehaving node using a sequential hypothesis test, 2) performs well in realistic erroneous channel conditions due to its ability to accurately capture link heterogeneity, and 3) incurs negligible memory and computation overheads as it makes detection decisions based on runtime observations. The effectiveness of the proposed scheme is evaluated via extensive simulation as well as implementation, demonstrating its capability of accurately detecting nodess' selfish behavior in realistic 802.11 WLAN environments.
Conference Paper
In today's society digital services have become the key to the success of anyone. Hence, for being competitive it is important that these services are available, employ the latest technology and are low cost. Unfortunately, it often happens that these good intentions do not correspond to reality. In this paper an information system is proposed, targeted at those small realities affected by the digital divide and at those companies that employ out of date, high cost technologies, that provides data and voice services in a unified manner using heterogeneous devices. The system utilizes innovative technologies, in particular wireless technology, to deliver low cost solutions. The distinctive feature is that it does not depend on the network hardware infrastructure and the underlying platform. Furthermore, it deals with the configuration, accounting, security, management, and monitoring aspects while maintaining its flexibility and simplicity of use both for the administrator and end user.