Skip to main content

Detecting Transmission Power Misbehaviour in Wi-Fi Networks

  • Conference paper
Wireless Access Flexibility (WiFlex 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8072))

Included in the following conference series:

  • 554 Accesses

Abstract

In Wi-Fi networks, transmission (TX) power levels are constrained by regulatory limits. However, the emergence of flexible MAC drivers allows the easy modification of PHY and MAC layer parameters. This has enabled users to attempt to violate these limits. Such actions, which we refer to as TX power misbehaviour, allow users to achieve higher throughput due to the capture effect. Detecting this type of misbehaviour is challenging because of the inability to directly measure the TX power of a user’s device. Therefore, in this paper, we propose detection methods for (a) determining if the TX power violates regulatory limits and (b) estimating the TX power value. Separate methods are proposed for single and multi-rate modes of operation. Simulation results verify that the proposed methods may be successfully used to detect TX power misbehaviour. Therefore, they can be implemented in a general misbehaviour detection and reaction architecture, also presented in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE Std 802.11-2012, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks— Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (March 2012)

    Google Scholar 

  2. Kosek-Szott, K., Krasilov, A., Lyakhov, A., Natkaniec, M., Safonov, A., Szott, S., Tinnirello, I.: What’s New for QoS in IEEE 802.11? To appear in IEEE Network

    Google Scholar 

  3. Szott, S., Natkaniec, M., Pach, A.R.: An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes. EURASIP Journal on Wireless Communications and Networking 2010, Article ID 209895, 13 pages (2010), doi: 10.1155/2010/209895

    Google Scholar 

  4. Tinnirello, I., Bianchi, G., Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F.: Wireless MAC Processors: Programming MAC Protocols on Commodity Hardware. In: Proc. of IEEE INFOCOM (March 2012)

    Google Scholar 

  5. Lee, J., Kim, W., Lee, S.-J., Jo, D., Ryu, J., Kwon, T., Choi, Y.: An experimental study on the capture effect in 802.11a networks. In: Proc. of WinTECH 2007 (2007)

    Google Scholar 

  6. FP7-ICT project: FLexible Architecture for Virtualizable future wireless Internet Access—FLAVIA, http://www.ict-flavia.eu

  7. Szott, S., Natkaniec, M., Canonico, R.: Detecting backoff misbehaviour in IEEE 802.11 EDCA. Wiley European Transactions on Telecommunications 22(1), 31–34 (2011), doi:10.1002/ett.1459

    Article  Google Scholar 

  8. Cardenas, A., Radosavac, S., Baras, J.: Performance Comparison of Detection Schemes for MAC Layer Misbehavior. In: Proc. of INFOCOM (2007)

    Google Scholar 

  9. Guang, L., Assi, C., Benslimane, A.: MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wireless Communications 15, 6–14 (2008)

    Article  Google Scholar 

  10. Fragkiadakis, A., Siris, V., Petroulakis, N.: Anomaly-based intrusion detection algorithms for wireless networks. Wired/Wireless Internet Communications, 192–203 (2010)

    Google Scholar 

  11. Natkaniec, M., Pach, A.R.: A performance analysis of IEEE 802.11 networks in the presence of hidden stations. In: Proc. of the IFIP TC6, WG6.8 5th Workshop on Personal Wireless Communication (PWC 2000), pp. 157–168 (2000)

    Google Scholar 

  12. Kosek, K., Natkaniec, M., Vollero, M.L., Pach, A.R.: An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. In: ICOIN 2008, Busan, Korea, January 23-25 (2008)

    Google Scholar 

  13. Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, pp. 191–204. ACM (June 2006)

    Google Scholar 

  14. Szott, S., Natkaniec, M., Pach, A.R.: Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. Wiley Security and Communication Networks 6(4), 509–522 (2013)

    Article  Google Scholar 

  15. Kamerman, A., Monteban, L.: WaveLAN-II: A highperformance wireless LAN for the unlicensed band: Wireless. Bell Labs Technical Journal 2(3), 118–133 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Szott, S., Sikora, M., Natkaniec, M., Loziak, K. (2013). Detecting Transmission Power Misbehaviour in Wi-Fi Networks. In: Bianchi, G., Lyakhov, A., Khorov, E. (eds) Wireless Access Flexibility. WiFlex 2013. Lecture Notes in Computer Science, vol 8072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39805-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39805-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39804-9

  • Online ISBN: 978-3-642-39805-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics