A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs
Autor: | Eduard Garcia-Villegas, Muhammad Shahwaiz Afaqui, Elena Lopez-Aguilera |
---|---|
Přispěvatelé: | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, Universitat Politècnica de Catalunya. WNG - Grup de xarxes sense fils |
Jazyk: | angličtina |
Rok vydání: | 2015 |
Předmět: |
Scheme (programming language)
IEEE 802.11 Computer Networks and Communications business.industry Inter-Access Point Protocol Computer science Testbed Wireless LANs Xarxes locals sense fil Wi-Fi Adversary Enginyeria de la telecomunicació [Àrees temàtiques de la UPC] WLAN networks Wireless lan Metric (mathematics) Security Jamming business computer Access time performance Computer network computer.programming_language Cheater |
Zdroj: | UPCommons. Portal del coneixement obert de la UPC Universitat Politècnica de Catalunya (UPC) Recercat. Dipósit de la Recerca de Catalunya instname |
Popis: | The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from the fact that beacon frames are always given preference in IEEE 802.11 networks. An analytical model to define the aforementioned metric is presented and evaluated with experiments and simulations. Furthermore, we evaluate the adversary detection capabilities of our scheme by means of simulations and experiments over a real testbed. The simulation and experimental results indicate consistency and both are found to follow the trends indicated in the analytical model. Measurement results indicate that our scheme is able to correctly detect a malicious entity at a distance of, at least, 120 m. Analytical, simulation and experimental results signify the validity of our scheme and highlight the fact that our scheme is both efficient and successful in detecting an adversary (either a jammer or a cheating device). As a proof of concept, we developed an application that when deployed at the IEEE 802.11 Access Point, is able to effectively detect an adversary. (C) 2015 Elsevier B.V. All rights reserved. |
Databáze: | OpenAIRE |
Externí odkaz: |