1,813 research outputs found

    Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks

    Get PDF
    The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations

    Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks

    Get PDF
    The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations

    Outage Capacity of Incremental Relaying at Low Signal-to-Noise Ratios

    Full text link
    We present the \epsilon-outage capacity of incremental relaying at low signal-to-noise ratios (SNR) in a wireless cooperative network with slow Rayleigh fading channels. The relay performs decode-and-forward and repetition coding is employed in the network, which is optimal in the low SNR regime. We derive an expression on the optimal relay location that maximizes the \epsilon-outage capacity. It is shown that this location is independent of the outage probability and SNR but only depends on the channel conditions represented by a path-loss factor. We compare our results to the \epsilon-outage capacity of the cut-set bound and demonstrate that the ratio between the \epsilon-outage capacity of incremental relaying and the cut-set bound lies within 1/\sqrt{2} and 1. Furthermore, we derive lower bounds on the \epsilon-outage capacity for the case of K relays.Comment: 5 pages, 4 figures, to be presented at VTC Fall 2009 in Anchorage, Alask

    SAI: safety application identifier algorithm at MAC layer for vehicular safety message dissemination over LTE VANET networks

    Get PDF
    Vehicular safety applications have much significance in preventing road accidents and fatalities. Among others, cellular networks have been under investigation for the procurement of these applications subject to stringent requirements for latency, transmission parameters, and successful delivery of messages. Earlier contributions have studied utilization of Long-Term Evolution (LTE) under single cell, Friis radio, or simplified higher layer. In this paper, we study the utilization of LTE under multicell and multipath fading environment and introduce the use of adaptive awareness range. Then, we propose an algorithm that uses the concept of quality of service (QoS) class identifiers (QCIs) along with dynamic adaptive awareness range. Furthermore, we investigate the impact of background traffic on the proposed algorithm. Finally, we utilize medium access control (MAC) layer elements in order to fulfill vehicular application requirements through extensive system-level simulations. The results show that, by using an awareness range of up to 250 m, the LTE system is capable of fulfilling the safety application requirements for up to 10 beacons/s with 150 vehicles in an area of 2 × 2 km2. The urban vehicular radio environment has a significant impact and decreases the probability for end-to-end delay to be ≤100 ms from 93%–97% to 76%–78% compared to the Friis radio environment. The proposed algorithm reduces the amount of vehicular application traffic from 21 Mbps to 13 Mbps, while improving the probability of end-to-end delay being ≤100 ms by 20%. Lastly, use of MAC layer control elements brings the processing of messages towards the edge of network increasing capacity of the system by about 50%

    TCP-MAC Interaction in Multi-hop Ad-hoc Networks

    Get PDF
    • …
    corecore