ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11

نویسندگان

  • Piyush Kumar Shukla
  • Sarita Singh Bhadauria
  • Sanjay Silakari
چکیده

The exponential growth of wireless network in recent years has brought some major research issues that include a fair share of the available bandwidth, quality of service (QoS) and control of misbehaving traffic nodes/sources. However, in wireless networks, including cellular, Ad Hoc, and sensor networks, that are based on a shared medium and often contention-oriented protocols, these issues have not been fully addressed. Most wireless networks are based on IEEE 802.11x standards which provide public wireless access to the Internet. The medium access control (MAC) in IEEE 802.11 uses a distributed contention resolution mechanism for sharing the channel. If the MAC protocol is manipulated or misused, then the consequences can be overwhelming, such as the disruption of the whole network. A selfish/cheater node [10] can manipulate the MAC protocol in different ways to gain access to the channel resulting in some cases of starvation of other nodes in the same network. The manipulation of the MAC layer protocol is hidden from the upper layers, and can be further enhanced if combined with more violations from these upper layers of the ISO/OSI Model. In wireless networks i.e. IEEE 802.11, all nodes contending to access the medium made-up to follow the rules of the Medium Access Control (MAC) sub layer. As the number of nodes increases; the probability of collisions obviously increases which causes longer back-off values of the collided nodes. A suspicious node may be either selfish node (or misbehaving node) which attempts to manipulate its back-off parameters of the CSMA / CA protocol to gain more and more access to the channel, hence get higher performance than their fair share. Suspicious nodes (Misbehavior Node). Which may be an attacker and can increase collisions to decrease the performance of MAC protocols by disobeying CSMA/CA or back-off rules. In this work, we discussed, analyzed and used selfish behavior by attackers to create an opportunist node. We also identified, declared and finally discard/disassociate the attacker nodes in IEEE 802.11 MAC layer environment. The Access point (AP) Allow most of the nodes offers more bandwidth (in terms of the extra number of slots to almost each node) while maintaining fairness if channel utilization is poor and this mode is called opportunist mode. The Proposed Protocol is called as the ARA-MAC. The performance of our method is evaluated through a simulation model to test efficiency. Various parameters are the basis for comparison between the implemented method and CSMA/CA. Key Performance Parameters i.e. Packet Delivery Ratio, RTS/Data Frames, Mean no. Of retry per frame have been used for comparison and performance evaluation. The results show that our proposed algorithm ARA-MAC outperforms basic CSMA/CA in terms of Attack Resiliency and Adaptability. ARA-MAC is able to detect and discard attacker nodes after identification of its maliciousness and also it provides adaptability in existing CSMA/CA. The time period for monitoring of node behavior varies according to the Fibonacci series to identify random timing attackers and also it reduces unnecessary execution of ARA-MAC algorithm at AP (Access Point). This is predominantly important in a distributed system where power consumption is a big concern especially in the case of Wireless Sensor Network. It is also important in a centralized system where constant monitoring of a large number of sources from the Access Point (AP) alone may become promptly a big burden on it. The main purpose of this work is to increase the channel utilization by offering opportunities to a node, and detect such node that is using this concept to degrade the network performance in terms of degraded channel utilization. General Terms Protocol Modification and System Development for Attack Resiliency at MAC Layer.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol

IEEE 802.11 Distributed Coordination Function (DCF) guarantees fair transmission opportunity to stations. Channel occupation of low rate stations in IEEE 802.11 Wireless Local Area Network (WLAN) causes the performance anomaly resulting in the degradation of overall network throughput. Using cooperative communications between a high rate station and a low rate station, performance anomaly can b...

متن کامل

Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement

IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is Distributed Coordination Function(DCF), which is a Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA) with binary slotted exponential back-off scheme. Since IEEE 802.11 MAC...

متن کامل

NICE - a decentralized medium access control using neighborhood information classification and estimation for multimedia applications in ad hoc 802.11 wireless LANs

The desired properties of a medium access control (MAC) protocol in mobile ad hoc network (MANET) include (1) meet quality of service (QoS) requirements for real-time nodes, (2) be decentralized, (3) achieve fairness from viewpoint of throughput or energy consumption, and (4) be immune to the hidden node problem. Though there have been numerous proposed MAC protocols for the IEEE 802.11 WLAN, f...

متن کامل

A survey of energy efficient MAC protocols for IEEE 802.11 WLAN

0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.09.008 ⇑ Corresponding author. Address: 1001 University ROC. Tel.: +886 3 5712121x54717; fax: +886 3 57214 E-mail addresses: [email protected] (S.-L. Tsao Huang). In recent years, IEEE 802.11 wireless local area networks (WLANs) have been widely deployed, and more and more mobile devices have built-in WLAN interface...

متن کامل

Distributed Medium Access Control with SDMA Support for WLANs

SUMMARY With simultaneous multiuser transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012