University of Hertfordshire

By the same authors

Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. / Alocious, Chaminda; Xiao, Hannan; Christianson, B.; Malcolm, James.

Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015). IEEE, 2015.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Alocious, C, Xiao, H, Christianson, B & Malcolm, J 2015, Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. in Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015). IEEE, The 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, United Kingdom, 26/10/15. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.276

APA

Alocious, C., Xiao, H., Christianson, B., & Malcolm, J. (2015). Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. In Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015) IEEE. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.276

Vancouver

Alocious C, Xiao H, Christianson B, Malcolm J. Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. In Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015). IEEE. 2015 https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.276

Author

Alocious, Chaminda ; Xiao, Hannan ; Christianson, B. ; Malcolm, James. / Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing: (DASC-2015). IEEE, 2015.

Bibtex

@inproceedings{3975ba26aad24913892500da06c67196,
title = "Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots",
abstract = "IEEE 802.11 protocol assumes all the nodes in the network cooperate and adhere to the standard. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources or disrupt network performance. Previously, Kausanaur proposed a Receiver Trusted MAC protocol (RECTR-MAC)by extending IEEE 802.11 to prevent Medium Access Control (MAC) sender misbehaviours. This protocol trusts the receiving node (Access Point) in a WLAN and enables the Access Point to allocate the MAC protocol random backoff values for wireless clients. Our research investigates MAC layer nodemisbehaviours in the context of a Public Wireless Hotspot. RECTR-MAChas been implemented by porting the legacy code-base to the latest ns2. Furthermore, our evaluation has been extended to incorporate several Access Point misbehaviours to simulate the scenario of an untrusted hotspot (misbehaving access point) , which has not been investigated much in the literature. In public wireless hotspot the misbehaving wireless senders could run a malware at the Hotspot to gain the access to alter the MAC protocol operation. The experiment results show that Hotspot misbehaviours significantly affect the network performance, nodes throughput reduced by 50% and misbehaviour detection accuracy by 40%. The results have also been compared with thestandard IEEE 802.11 protocol. This evaluation is important to understand the design principles for a reliable MAC protocol which should be resilient against MAC layer misbehaviours.Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks",
author = "Chaminda Alocious and Hannan Xiao and B. Christianson and James Malcolm",
year = "2015",
month = oct,
doi = "10.1109/CIT/IUCC/DASC/PICOM.2015.276",
language = "English",
booktitle = "Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing",
publisher = "IEEE",
note = "The 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) ; Conference date: 26-10-2015 Through 28-10-2015",

}

RIS

TY - GEN

T1 - Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

AU - Alocious, Chaminda

AU - Xiao, Hannan

AU - Christianson, B.

AU - Malcolm, James

PY - 2015/10

Y1 - 2015/10

N2 - IEEE 802.11 protocol assumes all the nodes in the network cooperate and adhere to the standard. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources or disrupt network performance. Previously, Kausanaur proposed a Receiver Trusted MAC protocol (RECTR-MAC)by extending IEEE 802.11 to prevent Medium Access Control (MAC) sender misbehaviours. This protocol trusts the receiving node (Access Point) in a WLAN and enables the Access Point to allocate the MAC protocol random backoff values for wireless clients. Our research investigates MAC layer nodemisbehaviours in the context of a Public Wireless Hotspot. RECTR-MAChas been implemented by porting the legacy code-base to the latest ns2. Furthermore, our evaluation has been extended to incorporate several Access Point misbehaviours to simulate the scenario of an untrusted hotspot (misbehaving access point) , which has not been investigated much in the literature. In public wireless hotspot the misbehaving wireless senders could run a malware at the Hotspot to gain the access to alter the MAC protocol operation. The experiment results show that Hotspot misbehaviours significantly affect the network performance, nodes throughput reduced by 50% and misbehaviour detection accuracy by 40%. The results have also been compared with thestandard IEEE 802.11 protocol. This evaluation is important to understand the design principles for a reliable MAC protocol which should be resilient against MAC layer misbehaviours.Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks

AB - IEEE 802.11 protocol assumes all the nodes in the network cooperate and adhere to the standard. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources or disrupt network performance. Previously, Kausanaur proposed a Receiver Trusted MAC protocol (RECTR-MAC)by extending IEEE 802.11 to prevent Medium Access Control (MAC) sender misbehaviours. This protocol trusts the receiving node (Access Point) in a WLAN and enables the Access Point to allocate the MAC protocol random backoff values for wireless clients. Our research investigates MAC layer nodemisbehaviours in the context of a Public Wireless Hotspot. RECTR-MAChas been implemented by porting the legacy code-base to the latest ns2. Furthermore, our evaluation has been extended to incorporate several Access Point misbehaviours to simulate the scenario of an untrusted hotspot (misbehaving access point) , which has not been investigated much in the literature. In public wireless hotspot the misbehaving wireless senders could run a malware at the Hotspot to gain the access to alter the MAC protocol operation. The experiment results show that Hotspot misbehaviours significantly affect the network performance, nodes throughput reduced by 50% and misbehaviour detection accuracy by 40%. The results have also been compared with thestandard IEEE 802.11 protocol. This evaluation is important to understand the design principles for a reliable MAC protocol which should be resilient against MAC layer misbehaviours.Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks

U2 - 10.1109/CIT/IUCC/DASC/PICOM.2015.276

DO - 10.1109/CIT/IUCC/DASC/PICOM.2015.276

M3 - Conference contribution

BT - Procs of the 13th IEEE Int Conf on Dependable, Autonomic and Secure Computing

PB - IEEE

T2 - The 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015)

Y2 - 26 October 2015 through 28 October 2015

ER -