1,328 research outputs found

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Full text link
    In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. "The moving observer" approach could help not only in the evaluation of steganographic algorithms, but also might be a starting point for a new detection system of network steganography. The concept of a new detection system, called MoveSteg, is explained in detail.Comment: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 201

    Thwarting Selfish Behavior in 802.11 WLANs

    Get PDF
    The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react, upon detecting a selfish station, by using a more aggressive configuration that penalizes this station. We show that the proposed algorithm guarantees global stability while providing good response times. By conducting a game theoretic analysis of the algorithm based on repeated games, we also show its effectiveness against selfish stations. Simulation results confirm that the proposed algorithm optimizes throughput performance while discouraging selfish behavior. We also present an experimental prototype of the proposed algorithm demonstrating that it can be implemented on commodity hardware.Comment: 14 pages, 7 figures, journa

    A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs

    Get PDF
    The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from the fact that beacon frames are always given preference in IEEE 802.11 networks. An analytical model to define the aforementioned metric is presented and evaluated with experiments and simulations. Furthermore, we evaluate the adversary detection capabilities of our scheme by means of simulations and experiments over a real testbed. The simulation and experimental results indicate consistency and both are found to follow the trends indicated in the analytical model. Measurement results indicate that our scheme is able to correctly detect a malicious entity at a distance of, at least, 120 m. Analytical, simulation and experimental results signify the validity of our scheme and highlight the fact that our scheme is both efficient and successful in detecting an adversary (either a jammer or a cheating device). As a proof of concept, we developed an application that when deployed at the IEEE 802.11 Access Point, is able to effectively detect an adversary. (C) 2015 Elsevier B.V. All rights reserved.Postprint (author's final draft

    STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs

    Full text link
    Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay based cooperation schemes, utilizing multiple relays further improves the reliability and rate of transmissions. Distributed space-time coding (DSTC), as one of the schemes to utilize multiple relays, requires tight coordination between relays and does not perform well in a distributed environment with mobility. In this paper, a cooperative medium access control (MAC) layer protocol, called \emph{STiCMAC}, is designed to allow multiple relays to transmit at the same time in an IEEE 802.11 network. The transmission is based on a novel DSTC scheme called \emph{randomized distributed space-time coding} (\emph{R-DSTC}), which requires minimum coordination. Unlike conventional cooperation schemes that pick nodes with good links, \emph{STiCMAC} picks a \emph{transmission mode} that could most improve the end-to-end data rate. Any station that correctly receives from the source can act as a relay and participate in forwarding. The MAC protocol is implemented in a fully decentralized manner and is able to opportunistically recruit relays on the fly, thus making it \emph{robust} to channel variations and user mobility. Simulation results show that the network capacity and delay performance are greatly improved, especially in a mobile environment.Comment: This paper is a revised version of a paper with the same name submitted to IEEE Transaction on Wireless Communications. STiCMAC protocol with RTS/CTS turned off is presented in the appendix of this draf

    Modelling IEEE 802.11 CSMA/CA RTS/CTS with stochastic bigraphs with sharing

    Get PDF
    Stochastic bigraphical reactive systems (SBRS) is a recent formalism for modelling systems that evolve in time and space. However, the underlying spatial model is based on sets of trees and thus cannot represent spatial locations that are shared among several entities in a simple or intuitive way. We adopt an extension of the formalism, SBRS with sharing, in which the topology is modelled by a directed acyclic graph structure. We give an overview of SBRS with sharing, we extend it with rule priorities, and then use it to develop a model of the 802.11 CSMA/CA RTS/CTS protocol with exponential backoff, for an arbitrary network topology with possibly overlapping signals. The model uses sharing to model overlapping connectedness areas, instantaneous prioritised rules for deterministic computations, and stochastic rules with exponential reaction rates to model constant and uniformly distributed timeouts and constant transmission times. Equivalence classes of model states modulo instantaneous reactions yield states in a CTMC that can be analysed using the model checker PRISM. We illustrate the model on a simple example wireless network with three overlapping signals and we present some example quantitative properties

    Loss Diagnosis and Indoor Position Location System based on IEEE 802.11 WLANs

    Get PDF
    Wireless local area networks (WLANs) have been widely deployed to provide short range broadband communications. Due to the fast evolvement of IEEE 802.11 based WLAN standards and various relevant applications, many research efforts have been focused on the optimization of WLAN data rate, power and channel utilization efficiency. On the other hand, many emerging applications based on WLANs have been introduced. Indoor position location (IPL) system is one of such applications which turns IEEE 802.11 from a wireless communications infrastructure into a position location network. This thesis mainly focuses on data transmission rate enhancement techniques and the development of IEEE 802.11 WLAN based IPL system with improved locationing accuracy. In IEEE 802.11 systems, rate adaptation algorithms (RAAs) are employed to improve transmission efficiency by choosing an appropriate modulation and coding scheme accord­ ing to point-to-point channel conditions. However, due to the resource-sharing nature of WLANs, co-channel interferences and frame collisions cannot be avoided, which further complicates the wireless environment and makes the RAA design a more challenging task. As WLAN performance depends on many dynamic factors such as multipath fading and co-channel interferences, differentiating the cause of performance degradation such as frame losses, which is known as loss diagnosis techniques, is essential for performance enhance­ ments of existing rate adaptation schemes. In this thesis, we propose a fast and reliable collision detection scheme for frame loss diagnosis in IEEE 802.11 WLANs. Collisions are detected by tracking changes of the signal-to-interference-and-noise-ratio (SINR) in IEEE 802.11 WLANs with a nonparametric order-based cumulative sum (CUSUM) algorithm for rapid loss diagnosis. Numerical simulations are conducted to evaluate the effectiveness of the proposed collision detection scheme. The other aspect of this thesis is the investigation of an IEEE 802.11 WLAN based IPL system. WLAN based IPL systems have received increasing attentions due to their variety of potential applications. Instead of relying on dedicated locationing networks and devices, IEEE 802.11 WLAN based IPL systems utilize widely deployed IEEE 802.11 WLAN infrastructures and standardized wireless stations to determine the position of a target station in indoor environments. iii Abstract In this thesis, a WLAN protocol-based distance measurement technique is investigated, which takes advantages of existing IEEE 802.11 data/ACK frame exchange sequences. In the proposed distance measurement technique, neither dedicated hardware nor hardware modifications is required. Thus it can be easily integrated into off-the-shelf commercial, inexpensive WLAN stations for IPL system implementation. Field test results confirm the efficacy of the proposed protocol-based distance measurement technique. Furthermore, a preliminary IPL system based on the proposed method is also developed to evaluate the feasibility of the proposed technique in realistic indoor wireless environments

    IEEE 802.11ax: challenges and requirements for future high efficiency wifi

    Get PDF
    The popularity of IEEE 802.11 based wireless local area networks (WLANs) has increased significantly in recent years because of their ability to provide increased mobility, flexibility, and ease of use, with reduced cost of installation and maintenance. This has resulted in massive WLAN deployment in geographically limited environments that encompass multiple overlapping basic service sets (OBSSs). In this article, we introduce IEEE 802.11ax, a new standard being developed by the IEEE 802.11 Working Group, which will enable efficient usage of spectrum along with an enhanced user experience. We expose advanced technological enhancements proposed to improve the efficiency within high density WLAN networks and explore the key challenges to the upcoming amendment.Peer ReviewedPostprint (author's final draft
    • …
    corecore