CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11

by Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 19
Year of Publication: 2012
Authors: Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari
10.5120/7882-7465

Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari . ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11. International Journal of Computer Applications. 49, 19 ( July 2012), 1-11. DOI=10.5120/7882-7465

@article{ 10.5120/7882-7465,
author = { Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari },
title = { ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11 },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 19 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number19/7882-7465/ },
doi = { 10.5120/7882-7465 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:07.195900+05:30
%A Piyush Kumar Shukla
%A Sarita Singh Bhadauria
%A Sanjay Silakari
%T ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 19
%P 1-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential growth of wireless network in recent years has brought some major research issues that include a fair share of the available bandwidth, quality of service (QoS) and control of misbehaving traffic nodes/sources. However, in wireless networks, including cellular, Ad Hoc, and sensor networks, that are based on a shared medium and often contention-oriented protocols, these issues have not been fully addressed. Most wireless networks are based on IEEE 802. 11x standards which provide public wireless access to the Internet. The medium access control (MAC) in IEEE 802. 11 uses a distributed contention resolution mechanism for sharing the channel. If the MAC protocol is manipulated or misused, then the consequences can be overwhelming, such as the disruption of the whole network. A selfish/cheater node [10] can manipulate the MAC protocol in different ways to gain access to the channel resulting in some cases of starvation of other nodes in the same network. The manipulation of the MAC layer protocol is hidden from the upper layers, and can be further enhanced if combined with more violations from these upper layers of the ISO/OSI Model. In wireless networks i. e. IEEE 802. 11, all nodes contending to access the medium made-up to follow the rules of the Medium Access Control (MAC) sub layer. As the number of nodes increases; the probability of collisions obviously increases which causes longer back-off values of the collided nodes. A suspicious node may be either selfish node (or misbehaving node) which attempts to manipulate its back-off parameters of the CSMA / CA protocol to gain more and more access to the channel, hence get higher performance than their fair share. Suspicious nodes (Misbehavior Node). Which may be an attacker and can increase collisions to decrease the performance of MAC protocols by disobeying CSMA/CA or back-off rules. In this work, we discussed, analyzed and used selfish behavior by attackers to create an opportunist node. We also identified, declared and finally discard/disassociate the attacker nodes in IEEE 802. 11 MAC layer environment. The Access point (AP) Allow most of the nodes offers more bandwidth (in terms of the extra number of slots to almost each node) while maintaining fairness if channel utilization is poor and this mode is called opportunist mode. The Proposed Protocol is called as the ARA-MAC. The performance of our method is evaluated through a simulation model to test efficiency. Various parameters are the basis for comparison between the implemented method and CSMA/CA. Key Performance Parameters i. e. Packet Delivery Ratio, RTS/Data Frames, Mean no. Of retry per frame have been used for comparison and performance evaluation. The results show that our proposed algorithm ARA-MAC outperforms basic CSMA/CA in terms of Attack Resiliency and Adaptability. ARA-MAC is able to detect and discard attacker nodes after identification of its maliciousness and also it provides adaptability in existing CSMA/CA. The time period for monitoring of node behavior varies according to the Fibonacci series to identify random timing attackers and also it reduces unnecessary execution of ARA-MAC algorithm at AP (Access Point). This is predominantly important in a distributed system where power consumption is a big concern especially in the case of Wireless Sensor Network. It is also important in a centralized system where constant monitoring of a large number of sources from the Access Point (AP) alone may become promptly a big burden on it. The main purpose of this work is to increase the channel utilization by offering opportunities to a node, and detect such node that is using this concept to degrade the network performance in terms of degraded channel utilization.

References
  1. Andrew S. Tanenbaum, "Computer Networks", PHI, Fifth edition.
  2. Beerhouse A Foruzan, "Data Communications and Networking", McGraw Hill Publications, Fourth Edition.
  3. D. Seth, S. Patnaik, S. Pal, A Faired Quality of service assured a MAC protocol for mobile Ad-hoc network and its performance evaluation, IJWMN, International Journal of Wireless and Mobile Networks, 2011.
  4. M. Natkaniec, K. Kosek-Szott, S. Szott, in: T. Lagkas, P. Angelidis, L. Georgiadis, "Wireless Network Traffic and Quality of Service [4,10] Support: Trends and Standards", Chapter: QoS Support in Multi-hop Ad-hoc Networks, IGI Global, 2010.
  5. K. Kosek-Szott, M. Natkaniec, A. R. Pach, Busy Simon, "A new protocol for IEEE 802. 11 EDCA-based ad-hoc networks with hidden nodes", IEEE, GLOBECOM, 2010.
  6. Seok-Won Kang, Jae-Ryong Cha and Jae-Hyun Kim "A Novel estimation-Based Backoff Algorithm in the IEEE 802. 11 Based Wireless Network" , IEEE, CCNC 2010.
  7. R. Geng, Z. Li, L. Song, "AQMP: An adaptive QoS MAC protocol based on IEEE 802. 11 in ad hoc networks", in: Proc. Of the 5th International Conference on Wireless Communications, Networking and Mobile Computing – WiCom'09, 2009.
  8. R. Geng, L. Guo, X. Wang, "A new Adaptive MAC Protocol with QoS Support Based on IEEE 802. 11 in Ad Hoc Networks," Computers and Electrical Engineering, 2010.
  9. D. Seth, S. Patnaik, S. Pal, "A Faired Quality of service assured a MAC protocol for mobile Ad-hoc network and its performance evaluation,' International Journal of Wireless and Mobile Networks, 2011.
  10. Cagogj M. , S. Ganeriwal, I. Aad, and J. -P. Hubaux, "On cheating in CSMA/CA ad-hoc networks," Tech. Rep. , EPFL, February 2004.
  11. Lei Guang, Chadi Assi, Yinghua Ye, (2007) "DREAM: A system for detection and reactions against MAC Layer misbehavior in ad hoc networks," Computer Communications 30 (2007) pp1841-1853.
  12. Alberto Lopez Toledo, and Xiaodong Wang, (2007) "Robust Detection of Selfish Misbehavior in Wireless Networks," IEEE journal on selected areas in communications, vol. 25, number. 6, pp1124-1134, August 2007.
  13. Lei Guang and Chadi Assi, "Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks,", IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp1-16, 2006
  14. G. Bianchi, "Performance analysis of the IEEE 802. 11 distributed coordination function," IEEE Journal of Selected Areas in Communications, vol. 18, 2000.
  15. Elwathig Elhag and Mohamed," Adaptive Contention Window Scheme for WLANs", IAJIT, Vo. 4, N0. 4, October 2007.
  16. Nah-Oak Song, Byung-Jae Kwak, Jabin Song, Leonard E. Miller, (2003) "Enhancement of IEEE 802. 11 Distributed Coordination Function with Exponential Increase Exponential Decrease (EILD) Backoff Algorithm," In Proceedings of VTC Spring.
  17. M. Raya, J. P. Hubaux, and I. Aad, " DOMINO: A system to Detect greedy behavior in IEEE 802. 11 hotspots", In Proc. Of ACM MobiSys, June 2004.
  18. Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, "Detecting MAC layer Back-off Timer Violations in Mobile Ad Hoc Networks," In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, pp 63-72, 2006.
  19. . Sangwon Hyun and Peng Ning An Liu "Mitigating Wireless Jamming Attacks via Channel Migration" pp 313-322, 31st International Conference on Distributed Computing Systems Workshops, 2011.
  20. K. Kosek-Szott, M. Natkaniec, A. R. Pach, "A new protocol for IEEE 802. 11 EDCA-based ad-hoc networks with hidden nodes", in: Proc. Of the IEEE Global Communications Conference – IEEE GLOBECOM, 2010.
  21. A. Leonardi a, S. Palazzo a, C. Rametta a, E. W. Knightly: A new adaptive receiver-initiated scheme for mitigating starvation, in: Journal of Ad Hoc Networks, pp 1-14, Elsevier, 2011.
  22. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer, pp-1-38, 2006.
  23. Fei Xing, Student Member, IEEE, and Wenye Wang, Member, IEEE "On the Survivability of Wireless Ad-hoc Networks with Node Misbehaviors and Failures" Proceedings of the IEEE international Conference on Communications (ICC '06), 2006.
  24. David Malone, Ken Duffy, and Doug Leith , "Modeling the 802. 11 Distributed Coordination Function in Non-Saturated Heterogeneous Conditions," IEEE/ACM Transactions on Networking, Vol. 15, No. 1, pp-159-172, 2007.
  25. Kyasanur, P. And Vaidya, N. , "Detection and handling of MAC layer misbehavior in wireless networks," in The selected Journal of Dependable Systems and Networks, June 2003.
  26. Frederico Calì, Marco Conti," Dynamic Tuning of the IEEE 802. 11 Protocol to Achieve a Theoretical Throughput Limit", IEEE/ACM Transactions on Networking, Vol-8, No- 6, pp-785-799, 2000.
  27. M. Bernaschi ,F. Ferreri , L. Valcamonici," Access points vulnerabilities to DoS attacks in 802. 11 networks" , Springer Science+Business Media, LLC , pp 1-11, 2006.
  28. Mina Malekzadeh, Abdul Azim Abdul Ghani and Shamala Subramaniam, "A new security model to prevent denial-of-service attacks and violation of availability in wireless networks", Wiley Online Library, pp-1-23,2011.
  29. R. Kalaiarasi, Getsy S. Sara S. Neelavathy Pari and D. Sridharan ," Performance analysis of contention window Cheating misbehaviors in mobile ad hoc networks" , International journal of computer science & information Technology (IJCSIT) Vol. 2, No. 5, pp-31-42, 2010.
  30. R. Geng, L. Guo, X. Wang, "A new Adaptive MAC Protocol with QoS Support Based on IEEE 802. 11 in Ad-hoc Networks",International Journal of Computers and Electrical Engineering, 2010.
  31. . Wu Xing-Feng, Liu Yuan-an, "A Survey of WLAN QoS Systems Based on IEEE 802. 11", IJCSNS International Journal of Computer Science and Network Security, Vol. 7, No. 3, March 2007.
  32. . Younggoo Kwon, Yuguang Fang and Haniph Latchman, "A Novel MAC Protocol with Fast Collision Resolution for Wireless LANs", IEEE INFOCOM 2003.
  33. A. L. Toledo and Xiaodong Wang, "Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks," IEEE Transactions on Information Forensics and Security, 3(3):347–358, September 2008.
  34. A. Cardenas, S. Radosavac, J. S. Baras, (2003) "Detection and prevention of MAC layer misbehavior for ad-hoc networks," In Proceedings of SASN, October 2003.
  35. S. R. , G. M. , J. S. Barasr, I. Koutsopoulos," An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks," ACM Transactions on Information and Systems Security, Vol. 11, No. 4, 2008.
  36. Jin Tang, Yu Cheng, Weihua Zhuang "An Analytical Approach to Real-Time Misbehavior Detection in IEEE 802. 11 Based Wireless Networks" IEEE, INFOCOM, 2011.
  37. Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria "Efficient Model for Attack Verification in 802. 11 WLAN using Filtering Mechanism Based Media Access Control Protocol FMB-MAC" International Journal of Information Technology and Knowledge Management July-Dec. 2011, Volume 4, No. 2. pp. 466-470.
  38. J. Kim, S. Kim, S. Choi, and D. Qiao, "CARA: Collision-Aware Rate Adaptation for IEEE 802. 11 WLANs," IEEE INFOCOM 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Attack Resiliency Adaptive MAC Opportunist Mode MAC Misbehavior Selfish Node Attack Contention Window CSMA/CA