O impacto de ataques RoQ em redes 802.11 com controle de potência de transmissão

  • Urlan S. de Barros UFPR
  • Tiago de C. Freire UFLA
  • Michele N. Lima UPMC
  • Luiz H. A. Correia UFLA
  • Aldri L. dos Santos UFPR

Abstract


IEEE 802.11 has two coordinator functions, called DCF and PCF, which are responsible for media access control. Transmition power control (TPC) has been employed to save power of devices and improve spatial reuse of the network. However, both 802.11 and TPC techniques are vulnerable to attacks that deny services, such as reduction of quality (RoQ) attacks, since they need that stations keep default transmission behavior. RoQ attacks intend to optimize the attack traffic to reach the maximum damage and avoid prevention or detection mechanisms. This work analyzes how RoQ attacks affect 802.11 and TPC techniques in relation to saving power and spatial reuse. We evaluate by simulation the impact of attacks considering three different TPC techniques: AEWMA, Atenuation and Basic Scheme. Results show higher saving power when using AEWMA technique, and that spatial reuse has been affected only in presence of 30% or more of misbehaving self-whiper RoQ attackers.

References

Awerbuch, B., Richa, A., and Scheideler, C. (2008). A jamming-resistant mac protocol for single-hop wireless networks. In Proceedings of the 27th ACM symposium on Principles of distributed computing (PODC ’08), pages 45–54, New York, NY, USA. ACM.

Baldo, N., Maguolo, F., Miozzo, M., Rossi, M., and Zorzi, M. (2007). ns2-miracle: a modular framework for multi-technology and cross-layer support in network simulator 2. In Proceedings of the 2nd international conference on Performance evaluation methodologies and tools (ValueTools ’07), pages 1–8, ICST, Brussels, Belgium, Belgium.

Bali, T. G. (2003). The generalized extreme value distribution. Economics Letters, 79(3):423–427.

Chen, H.-H., Fan, Z., and Li, J. (2006). Autonomous power control mac protocol for mobile ad hoc networks. EURASIP Journal on Wireless Communication and Networking, 2006(2).

Chen, Y. and Hwang, K. (2007). Spectral analysis of tcp flows for defense against reduction-of-quality attacks. In Proceedings of the 2007 IEEE International Conference on Communications (ICC ’07), pages 1203–1210.

Correia, L. H. A., Macedo, D. F., dos Santos, A. L., Loureiro, A. A., and Nogueira, J. M. In 24º Simpósio (2006). Ajustando a potência de transmissão em protocolos mac. Brasileiro de Redes de Computadores, pages 589–604.

Gast, M. (2005). 802.11 Wireless Networks: The Definitive Guide, Second Edition (Definitive Guide). O’Reilly Media, Inc.

Guirguis, M., Bestavros, A., and Matta, I. (2004). Exploiting the transients of adaptation for roq attacks on internet resources. In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP’04), pages 184–195, Washington, DC, USA. IEEE Computer Society.

Guirguis, M., Bestavros, A., and Matta, I. (2006). On the impact of low-rate attacks. Technical report, CS Department, Boston University.

Guirguis, M., Bestavros, A., Matta, I., and Zhang, Y. (2005). Reduction of quality (roq) attacks on internet end-systems. In Proceedings of the 24 th IEEE International Conference on Computer Communication (Infocom’05), pages 1362–1372.

Guirguis, M., Bestavros, A., Matta, I., and Zhang, Y. (2007). Reduction of quality (roq) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs. In Proceedings of the 26th IEEE International Conference on Computer Communication (Infocom’07).

Hansmann, U., Nicklous, M. S., and Stober, T. (2001). Pervasive computing handbook. Springer-Verlag New York, Inc., New York, NY, USA.

Jung, E.-S. and Vaidya, N. H. (2002). A power control mac protocol for ad hoc networks. In Proceedings of the 8th annual international conference on Mobile computing and networking (MobiCom ’02), pages 36–47, New York, NY, USA. ACM.

Karn, P. (1990). Maca — a new channel access method for packet radio. In Proceedings of the ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pages 134–140.

Khattab, S., Mosse, D., and Melhem, R. (2008). Jamming mitigation in multi-radio wireless networks: reactive or proactive? In Proceedings of the 4th international conference on Security and privacy in communication netowrks (SecureComm ’08), pages 1–10, New York, NY, USA. ACM.

Monks, J. P. (2001). Transmission power control for enhancing the performance of wireless packet data networks. Technical report.

Pires, A. A., Fontes, M. F., and de Rezende, J. F. (2004). Proposta e avaliação de um esquema de controle de potência com memória em redes ad hoc 802.11. In 22º Simpósio Brasileiro de Redes de Computadores.

Ren, W., yan Yeung, D., Jin, H., and Yang, M. (2008). Pulsing roq ddos attack and defense scheme in mobile ad hoc networks.

Su, X. and Boppana, R. V. (2007). On the impact of noise on mobile ad hoc networks. In Proceedings of the 2007 international conference on Wireless communications and mobile computing (IWCMC ’07), pages 208–213, New York, NY, USA. ACM.

Weiser, M. (1999). The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review, 3(3):3–11.
Published
2009-09-28
BARROS, Urlan S. de; FREIRE, Tiago de C.; LIMA, Michele N.; CORREIA, Luiz H. A.; SANTOS, Aldri L. dos. O impacto de ataques RoQ em redes 802.11 com controle de potência de transmissão. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 9. , 2009, Campinas. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2009 . p. 57-70. DOI: https://doi.org/10.5753/sbseg.2009.20623.

Most read articles by the same author(s)