1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE 802.11 public NetwOrks Prof. JP Hubaux Mobile Networks

Slides:



Advertisements
Similar presentations
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
Improving IEEE WLAN: QoS and Throughput Perspective Sunghyun Choi, Ph.D. Assistant Professor School of Electrical Engineering Seoul National University.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University “Broadnets.
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
Module C- Part 1 WLAN Performance Aspects
Chapter 9: Selfish behavior at the MAC layer of CSMA/CA
1 MSWiM 2004 Rational Behaviors in WiFi Hotspots and in Ad Hoc Networks Jean-Pierre Hubaux EPFL.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Experimental Measurement of VoIP Capacity in IEEE WLANs Sangho Shin Henning Schulzrinne Department of Computer Science Columbia University.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Diagnosing Wireless TCP Performance Problems: A Case Study Tianbo Kuang, Fang Xiao, and Carey Williamson University of Calgary.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
WiFi Models EE 228A Lecture 5 Teresa Tung and Jean Walrand
Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.
QoS of Voice over with NS simulator Prepared by: Yoshpa Benny Shraer Alexander Vainer Albert Instructors: Prof. Reuven Cohen Mr. Itai Dabran.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Doc.: IEEE /0953r0 Submission July 2011 Edward Reuss, SK CommunicationsSlide 1 Channel Contention with a Large Number of Devices Date:
CIS 725 Wireless networks. Low bandwidth High error rates.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Voice over WiFi R 張素熒 R 朱原陞 R 王振宇
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Methods for providing Quality of Service in WLANs W.Burakowski, A. Beben, J.Sliwinski Institute of Telecommunications, Warsaw University of Technology,
1 Some Security Challenges for Mesh Networks Jean-Pierre Hubaux EPFL Switzerland Joint work with Imad Aad, Naouel Ben Salem, Levente Buttyan, Srdjan Capkun,
IEEE EDCF: a QoS Solution for WLAN Javier del Prado 1, Sunghyun Choi 2 and Sai Shankar 1 1 Philips Research USA - Briarcliff Manor, NY 2 Seoul National.
Fundamentals of Computer Networks ECE 478/578
Fast Resilient Jumbo Frames in Wireless LANs Apurv Bhartia University of Texas at Austin Joint work with Anand Padmanabha Iyer, Gaurav.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Qos support and adaptive video. QoS support in ad hoc networks MAC layer techniques: – e - alternation of contention based and contention free periods;
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Planning and Analyzing Wireless LAN
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Doc.: IEEE /1263r2 Submission Dec 2009 Z. Chen, C. Zhu et al [Preliminary Simulation Results on Power Saving] Date: Authors: Slide.
Chapter 14 Wireless LANs.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
MAC Protocols for Sensor Networks
IEEE MAC Ikjun Yeom. Computer Network Physical Layer: network card, wire/wireless Datalink Layer: data delivery in a link Network Layer: addressing,
MAC Protocols for Sensor Networks
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
VoIP over Wireless Networks
Medium Access Control MAC protocols: design goals, challenges,
Topics in Distributed Wireless Medium Access Control
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Ad-hoc Transport Layer Protocol (ATCP)
[Preliminary Simulation Results on Power Saving]
Adaptive approach for QoS support in IEEE e WLAN
Simulation Results for QoS, pDCF, VDCF, Backoff/Retry
[Preliminary Simulation Results on Power Saving]
Self Organized Networks
DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
DL MU MIMO Error Handling and Simulation Results
Presentation transcript:

1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks

2/26 Outlines  Motivation  System model  Misbehavior techniques  Components of DOMINO (System for Detection Of greedy behavior in the MAC layer of IEEE public NetwOrks)  Simulation  Implementation

3/26 Motivation  Internet access through public hotspots  Problem: misuse of protocols  What about MAC-layer misbehavior? –Considerable bandwidth gains –Hidden from the upper layers –Always usable  If the misbehavior is detected, the WISP can take measures How to detect?

4/26 System model  Infrastructure mode  DCF (Distributed Coordination Function)  Single trusted AP operated by a WISP  Misbehavior is greedy as opposed to malicious  DOMINO is implemented only at the AP

5/26 Example scenario Well-behaved node CheaterWell-behaved node DOMINO

6/26 IEEE MAC – Brief reminder

7/26 Misbehavior techniques – Overview  Uplink traffic (stations AP) –Example scenarios: backup, webcam, …  Downlink traffic (AP stations) –Constitutes most of the wireless traffic –Over 90% is TCP –Example scenarios: Web browsing, FTP, video streaming, …

8/26 Uplink traffic – Frame scrambling

9/26 Solution: Number of retransmissions  Lost frames are retransmitted  Sequence numbers in the MAC header distinguish retransmissions  Cheater’s retransmissions are fewer than those of well- behaved stations  By counting retransmissions, the AP can single out the cheater

10/26 Uplink traffic – Oversized NAV

11/26 Solution: Comparison of NAVs  AP measures the actual NAV and compares to the received one  A repeated pattern of oversized NAVs distinguishes the cheater

12/26 Uplink traffic – Short DIFS

13/26 Solution: Comparison of DIFS  The value of DIFS is constant and provided by the IEEE standard  A short DIFS cannot be but the result of cheating

14/26 Uplink traffic – Backoff

15/26 Solution (1/2): Actual backoff test  Compares the average actual backoff of each station to the average actual backoff of the AP  Collisions are not taken into account  Unsuitable for sources with interframe delays (e.g., due to TCP congestion control)

16/26 Solution (2/2): Consecutive backoff test  Useful when cheaters have interframe delays (mainly TCP sources)  Does not work if the traffic is very high due to the lack of samples  Complementary to the actual backoff test

17/26 Downlink traffic – TCP ACK scrambling  Server receives no TCP ACK and slows down the TCP flow  Repeated scrambling kills the TCP connection  The AP receives less packets destined to the well-behaved station  Packets destined to the cheater are delayed less in AP’s queue

18/26 TCP DATA scrambling with MAC forging  Tries to kill the TCP connection like the previous attack  MAC ACK contains no source address  The forged MAC ACK prevents the AP from retransmitting the lost packet

19/26 Solution: Dummy frame injection  AP periodically injects dummy frames destined to non- existing stations  If it receives corresponding MAC ACKs, there is cheating  Higher-layer mechanisms will identify the cheater (e.g., by monitoring the TCP flows of stations)

20/26 Components of DOMINO Consecutive backoff Actual backoff Backoff manipulation Comparison of the idle time after the last ACK with DIFS Transmission before DIFS Comparison of the declared and actual NAV values Oversized NAV Number of retransmissions Frame scrambling Detection testCheating method Frame scrambling with MAC forging Periodic dummy frame injection

21/26 Simulation – Topology  ns-2  Backoff manipulation  CBR / UDP traffic  FTP / TCP traffic  misbehavior coefficient (m): cheater chooses its backoff from the fixed contention window (1 - m) x CWmin

22/26 Simulation – DOMINO performance – UDP case

23/26 Simulation – DOMINO performance – TCP case

24/26 Implementation  Equipment –Adapters based on the Atheros AR5212 chipset –MADWIFI driver  Misbehavior (backoff) –Write to the register containing CWmin and CWmax (in driver)  Monitoring –The driver in MONITOR mode –prism2 frame header

25/26 Implementation – Throughput

26/26 Implementation – Backoff and DOMINO For more information: domino.epfl.ch