4 research outputs found

    IEEE 802.11g performance in presence of beacon control frames

    Get PDF
    Most studies of the performance of IEEE 802.11 consider scenarios of ad-hoc topology networks and do not contemplate the network broadcast information contained in beacon frames. The paper presents a study of the performance of a WLAN whose infrastructure's topology is such that the access point is in charge of broadcasting the beacon frames. Thus, it is more realistic than previous studies, because beacon frames are usually transmitted in order to announce control information and network identity. Furthermore, in the coverage area, user stations are likely to be working at different data rates, depending on their signal quality. Because beacon frames must be received by all stations, they are transmitted at the lowest data rate operating in the coverage area. The article introduces a mathematical method to calculate the influence of beacon frames on the total throughput, collision probability and delays of the IEEE 802.11g protocol. The model is validated by simulation analysis.Peer Reviewe

    A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs

    Get PDF
    The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from the fact that beacon frames are always given preference in IEEE 802.11 networks. An analytical model to define the aforementioned metric is presented and evaluated with experiments and simulations. Furthermore, we evaluate the adversary detection capabilities of our scheme by means of simulations and experiments over a real testbed. The simulation and experimental results indicate consistency and both are found to follow the trends indicated in the analytical model. Measurement results indicate that our scheme is able to correctly detect a malicious entity at a distance of, at least, 120 m. Analytical, simulation and experimental results signify the validity of our scheme and highlight the fact that our scheme is both efficient and successful in detecting an adversary (either a jammer or a cheating device). As a proof of concept, we developed an application that when deployed at the IEEE 802.11 Access Point, is able to effectively detect an adversary. (C) 2015 Elsevier B.V. All rights reserved.Postprint (author's final draft

    IEEE 802.11g performance in presence of beacon control frames

    No full text
    Most studies of the performance of IEEE 802.11 consider scenarios of ad-hoc topology networks and do not contemplate the network broadcast information contained in beacon frames. The paper presents a study of the performance of a WLAN whose infrastructure's topology is such that the access point is in charge of broadcasting the beacon frames. Thus, it is more realistic than previous studies, because beacon frames are usually transmitted in order to announce control information and network identity. Furthermore, in the coverage area, user stations are likely to be working at different data rates, depending on their signal quality. Because beacon frames must be received by all stations, they are transmitted at the lowest data rate operating in the coverage area. The article introduces a mathematical method to calculate the influence of beacon frames on the total throughput, collision probability and delays of the IEEE 802.11g protocol. The model is validated by simulation analysis.Peer Reviewe

    IEEE 802.11g performance in presence of beacon control frames

    No full text
    Most studies of the performance of IEEE 802.11 consider scenarios of ad-hoc topology networks and do not contemplate the network broadcast information contained in beacon frames. The paper presents a study of the performance of a WLAN whose infrastructure's topology is such that the access point is in charge of broadcasting the beacon frames. Thus, it is more realistic than previous studies, because beacon frames are usually transmitted in order to announce control information and network identity. Furthermore, in the coverage area, user stations are likely to be working at different data rates, depending on their signal quality. Because beacon frames must be received by all stations, they are transmitted at the lowest data rate operating in the coverage area. The article introduces a mathematical method to calculate the influence of beacon frames on the total throughput, collision probability and delays of the IEEE 802.11g protocol. The model is validated by simulation analysis.Peer Reviewe
    corecore