Disabling misbehavior with traffic constraints in WLANs

Hwangnam Kim, Hwantae Kim, Wonkyun Park, Mungyu Bae

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.

Original languageEnglish
Pages (from-to)1817-1833
Number of pages17
JournalComputer Journal
Volume57
Issue number12
DOIs
Publication statusPublished - 2013 Jul 5

Fingerprint

Wireless local area networks (WLAN)
Transmission control protocol
Frequency allocation
Network protocols
Medium access control
Bandwidth

Keywords

  • hot spots
  • IEEE 802.11
  • misbehavior
  • network calculus

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Disabling misbehavior with traffic constraints in WLANs. / Kim, Hwangnam; Kim, Hwantae; Park, Wonkyun; Bae, Mungyu.

In: Computer Journal, Vol. 57, No. 12, 05.07.2013, p. 1817-1833.

Research output: Contribution to journalArticle

Kim, Hwangnam ; Kim, Hwantae ; Park, Wonkyun ; Bae, Mungyu. / Disabling misbehavior with traffic constraints in WLANs. In: Computer Journal. 2013 ; Vol. 57, No. 12. pp. 1817-1833.
@article{a2c4f69cd3d742348c8ab29540e1fcfe,
title = "Disabling misbehavior with traffic constraints in WLANs",
abstract = "In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.",
keywords = "hot spots, IEEE 802.11, misbehavior, network calculus",
author = "Hwangnam Kim and Hwantae Kim and Wonkyun Park and Mungyu Bae",
year = "2013",
month = "7",
day = "5",
doi = "10.1093/comjnl/bxt121",
language = "English",
volume = "57",
pages = "1817--1833",
journal = "Computer Journal",
issn = "0010-4620",
publisher = "Oxford University Press",
number = "12",

}

TY - JOUR

T1 - Disabling misbehavior with traffic constraints in WLANs

AU - Kim, Hwangnam

AU - Kim, Hwantae

AU - Park, Wonkyun

AU - Bae, Mungyu

PY - 2013/7/5

Y1 - 2013/7/5

N2 - In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.

AB - In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.

KW - hot spots

KW - IEEE 802.11

KW - misbehavior

KW - network calculus

UR - http://www.scopus.com/inward/record.url?scp=84922586841&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84922586841&partnerID=8YFLogxK

U2 - 10.1093/comjnl/bxt121

DO - 10.1093/comjnl/bxt121

M3 - Article

VL - 57

SP - 1817

EP - 1833

JO - Computer Journal

JF - Computer Journal

SN - 0010-4620

IS - 12

ER -