Disabling misbehavior with traffic constraints in WLANs

Hwangnam Kim, Hwantae Kim, Wonkyun Park, Mungyu Bae

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    In this paper, we deal with vulnerabilities in IEEE 802.11 DCF protocol itself and its interaction with transmission control protocol (TCP) protocol. Selfish configurations at medium access control or TCP layer give an increased bandwidth share for selfish stations, and malicious operations disturb overall network operations. We first analyzed the bandwidth allocation for each station under the assumption that all the stations behave well by obeying the protocol. We then expressed the bandwidth allocation with the traffic constraints in network calculus theory in order to guarantee the fair access for well-behaving stations in the presence of misbehaving stations. Based on the network calculus model, we constructed the framework of protecting well-behaving stations from malicious or selfish behaviors, called NetPro. We then built up the proposed NetPro framework in a simulation environment and an empirical test-bed, and we carried out a performance evaluation study. The results indicate that the proposed network calculus-based protection framework successfully secures well-behaving stations from selfish or malicious misbehaviors.

    Original languageEnglish
    Pages (from-to)1817-1833
    Number of pages17
    JournalComputer Journal
    Volume57
    Issue number12
    DOIs
    Publication statusPublished - 2013 Jul 5

    Bibliographical note

    Publisher Copyright:
    © 2013 The British Computer Society. All rights reserved.

    Keywords

    • IEEE 802.11
    • hot spots
    • misbehavior
    • network calculus

    ASJC Scopus subject areas

    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Disabling misbehavior with traffic constraints in WLANs'. Together they form a unique fingerprint.

    Cite this