Abstract
In Wi-Fi networks, transmission (TX) power levels are constrained by regulatory limits. However, the emergence of flexible MAC drivers allows the easy modification of PHY and MAC layer parameters. This has enabled users to attempt to violate these limits. Such actions, which we refer to as TX power misbehaviour, allow users to achieve higher throughput due to the capture effect. Detecting this type of misbehaviour is challenging because of the inability to directly measure the TX power of a user’s device. Therefore, in this paper, we propose detection methods for (a) determining if the TX power violates regulatory limits and (b) estimating the TX power value. Separate methods are proposed for single and multi-rate modes of operation. Simulation results verify that the proposed methods may be successfully used to detect TX power misbehaviour. Therefore, they can be implemented in a general misbehaviour detection and reaction architecture, also presented in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE Std 802.11-2012, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks— Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (March 2012)
Kosek-Szott, K., Krasilov, A., Lyakhov, A., Natkaniec, M., Safonov, A., Szott, S., Tinnirello, I.: What’s New for QoS in IEEE 802.11? To appear in IEEE Network
Szott, S., Natkaniec, M., Pach, A.R.: An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes. EURASIP Journal on Wireless Communications and Networking 2010, Article ID 209895, 13 pages (2010), doi: 10.1155/2010/209895
Tinnirello, I., Bianchi, G., Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F.: Wireless MAC Processors: Programming MAC Protocols on Commodity Hardware. In: Proc. of IEEE INFOCOM (March 2012)
Lee, J., Kim, W., Lee, S.-J., Jo, D., Ryu, J., Kwon, T., Choi, Y.: An experimental study on the capture effect in 802.11a networks. In: Proc. of WinTECH 2007 (2007)
FP7-ICT project: FLexible Architecture for Virtualizable future wireless Internet Access—FLAVIA, http://www.ict-flavia.eu
Szott, S., Natkaniec, M., Canonico, R.: Detecting backoff misbehaviour in IEEE 802.11 EDCA. Wiley European Transactions on Telecommunications 22(1), 31–34 (2011), doi:10.1002/ett.1459
Cardenas, A., Radosavac, S., Baras, J.: Performance Comparison of Detection Schemes for MAC Layer Misbehavior. In: Proc. of INFOCOM (2007)
Guang, L., Assi, C., Benslimane, A.: MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wireless Communications 15, 6–14 (2008)
Fragkiadakis, A., Siris, V., Petroulakis, N.: Anomaly-based intrusion detection algorithms for wireless networks. Wired/Wireless Internet Communications, 192–203 (2010)
Natkaniec, M., Pach, A.R.: A performance analysis of IEEE 802.11 networks in the presence of hidden stations. In: Proc. of the IFIP TC6, WG6.8 5th Workshop on Personal Wireless Communication (PWC 2000), pp. 157–168 (2000)
Kosek, K., Natkaniec, M., Vollero, M.L., Pach, A.R.: An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. In: ICOIN 2008, Busan, Korea, January 23-25 (2008)
Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, pp. 191–204. ACM (June 2006)
Szott, S., Natkaniec, M., Pach, A.R.: Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. Wiley Security and Communication Networks 6(4), 509–522 (2013)
Kamerman, A., Monteban, L.: WaveLAN-II: A highperformance wireless LAN for the unlicensed band: Wireless. Bell Labs Technical Journal 2(3), 118–133 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Szott, S., Sikora, M., Natkaniec, M., Loziak, K. (2013). Detecting Transmission Power Misbehaviour in Wi-Fi Networks. In: Bianchi, G., Lyakhov, A., Khorov, E. (eds) Wireless Access Flexibility. WiFlex 2013. Lecture Notes in Computer Science, vol 8072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39805-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-39805-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39804-9
Online ISBN: 978-3-642-39805-6
eBook Packages: Computer ScienceComputer Science (R0)