Hidden Problems with the Hidden Node Problem

Similar documents
Hidden Problems with the Hidden Node Problem

Collisions & Virtual collisions in IEEE networks

Mohamed Khedr.

A Survey on Modified RTS/CTS Mechanism

Logical Link Control (LLC) Medium Access Control (MAC)

Rahman 1. Application

IBM Research Report. MACA-P : A MAC Protocol to Improve Parallelism in Multi-Hop Wireless Networks

The CMU Monarch Project s Wireless and Mobility Extensions to ns

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 6811 Ashikur Rahman

CSE 461: Wireless Networks

CMPE 257: Wireless and Mobile Networking

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

Wireless and Mobile Networks

Wireless Medium Access Control Protocols

CMPE 257: Wireless and Mobile Networking

MAC Protocol Implementation on Atmel AVR for Underwater Communication

MAC in /20/06

Wireless Network Security Spring 2013

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Link Layer and Ethernet

Link Layer and Ethernet

Wireless Local Area Networks (WLANs) Part I

IEEE Medium Access Control. Medium Access Control

Attacks on WLAN Alessandro Redondi

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

WITH the evolution and popularity of wireless devices,

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Wireless Network Security Spring 2014

CHAPTER 7 SIMULATION OBSERVATIONS

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks

Toward a Cross-layer Monitoring Process for Mobile Ad Hoc Networks

Wireless Network Security Spring 2015

Innovative Channel Release Schemes for Mobile ad hoc Networks

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

/$10.00 (c) 1998 IEEE

CMPE 257: Wireless and Mobile Networking

Link Layer. (continued)

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Indian Institute of Technology, Kharagpur

Wireless Network Security Spring 2012

Effectiveness of DSDV Protocol Under Hidden Node Environment

Strengthening Unlicensed Band Wireless Backhaul

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Computer Communication III

Wireless MACs: MACAW/802.11

Wireless LANs. ITS 413 Internet Technologies and Applications

IBM Research Report. A Label-switching Packet Forwarding Architecture for Multi-hop Wireless LANs

Wireless Networking & Mobile Computing

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Link Layer II: MACA and MACAW

Department of Electrical and Computer Systems Engineering

WLAN Performance Aspects

Lecture 16: QoS and "

Wireless Local Area Networks. Networks: Wireless LANs 1

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Cisco Cooperative Project. Coexistence of WiFi and LAA: Detection Thresholds. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen

Distributed power control over multiple channels for ad hoc wireless networks

Fu-Yi Hung ALL RIGHTS RESERVED

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

MAC LAYER. Murat Demirbas SUNY Buffalo

Transport layer issues

Wireless & Mobile Networking

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks

Wireless Network and Mobility

Introduction to IEEE

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CSE 461: Multiple Access Networks. This Lecture

EE 122: Ethernet and

MAC Protocol Implementation on Atmel AVR for Underwater Communication

Understanding the Gap between the IEEE Protocol Performance and the Theoretical Limits

CS 268: Computer Networking. Taking Advantage of Broadcast

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Performance Analysis for Channel Utilization in Wireless LAN

15-441: Computer Networking. Wireless Networking

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

Protecting Mobile Ad Hoc Networks from Spurious CTS Attacks 'Carrier Sensing based Deferral Mechanism'

Computer Networks (Fall 2011) Homework 2

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

CS 3640: Introduction to Networks and Their Applications

Transcription:

Hidden Problems with the Hidden Node Problem

Hidden Node Problem A B C Hidden node Outside the TX range of sender but within the range of receiver. C is hidden node! Throughput is decreased. Larger data packets are more vulnerable.

Solution in IEEE 802.11 For unicast packets it s a solved problem Four-way handshake RTS/CTS/DATA/ACK A B

Solution in IEEE 802.11 For unicast packets it s a solved problem Four-way handshake RTS/CTS/DATA/ACK A B

Solution in IEEE 802.11 For unicast packets it s a solved problem Four-way handshake RTS/CTS/DATA/ACK A B

Formally Duration field RTS DATA Sender CTS ACK Receiver Blue/red Node BSY Virtual CS Yellow Node BSY

Problem I: Prohibiting Parallel TX [1] Q A B P

Problem I: Prohibiting Parallel TX [1] Blue nodes can transmit in Parallel Yellow nodes can Receive in Parallel A B Red nodes are helpless!

Detecting Opportunities For Parallel TX If a node receives only RTS Can transmit in parallel If a node receives only CTS Can Receive in parallel If a node receives both RTS + CTS Can do nothing

Detecting Opportunities Does not help! Q A B P Duration field RTS DATA Sender CTS ACK Receiver Blue/red Node BSY Virtual CS Yellow Node BSY

Solution MAC-P [1] What is missing? 1. A time gap between RTS/CTS and Data so that potential nodes for parallel transmission can also exchange RTS-CTS 2. Consequently, an indication in RTS- CTS packets about the start time of Data and ACK packets

Solution MAC-P [1] Transmitting in Parallel RTS/CTS Source Dest T DATA T ACK Q R A B Master Transmission RTS T DATA T ACK DATA A CTS T DATA T ACK ACK B RTS T DATA DATA T ACK Q CTS T DATA T ACK ACK R

Solution MAC-P [1] Transmitting in Parallel RTS/CTS Source Dest T DATA T ACK Q A B P Z Master Transmission RTS T DATA T ACK DATA A CTS T DATA T ACK ACK B RTS DATA Z CTS ACK P

Principle for Parallel transmission A B Q P A B Q P There can be at most one transmitter within the reception range of a receiver A B Q P A B Q P A B Q P

MAC-P Performance Comparison

MAC-P Performance Comparison

MAC-P limitations: Packet size for non-master transmission should be less than that of master transmission. Designed for static network. For Mobile Network enabling parallel transmission is still an open problem!

Problem II: RTS/CTS-induced congestion [2]

Problem II: RTS/CTS-induced congestion [2] -MAC layer takes certain number of attempts and then drops. - It looks like congestion although buffer may still have space.

Blocked Node A C B Blocked D RTS

False blocking A C B Blocked RTS D E Falsely blocked

False blocking may propagate! A E C B Blocked RTS D G F

Pseudo deadlock

Pseudo deadlock

Solution RTS Validation

Problem III: Virtual Jamming [3] REAL JAMMING (Continuously generate interfering signals) DoS Attack VIRTUAL JAMMING (Pretend that you are transmitting)

Way of V. Jamming Duration field Format of RTS/CTS packet Large value on Duration field. Solution! Duration field is a 16 bit integer number. Deny access -Put for as a high large cap. as 32,767 micro second. -Ignore anything Roughly 30 RTS (30 X 32,767 = 983,010 microsec) packets per second above a is threshold. enough for full Denial of service!

Second kind of attack Attacker Receiver Blue/Red Node BSY BSY Yellow Node BSY BSY

Special scenario

Simulation Model Modified existing implementation of IEEE 802.11 in NS2. TR range equals CS range. Packet size 1024 bytes. Destination is within one-hop i.e. no routing protocol. No error model.

Effect on throughput Without Attack With Attack

Solution: RTS Validation Validate RTS by sensing the channel (Backward compatible!) When to validate?? Attacker Carrier Sense Receiver Blue/Red Node X X BSY Yellow Node BSY

Partial Virtual Jamming Validate RTS by sensing the channel (Backward compatible!) When to validate?? Attacker Carrier Sense Receiver Blue/Red Node BSY Yellow Node BSY

Solution: Random RTS Validation Validate RTS by sensing the channel (Backward compatible!) When to validate?? Attacker Carrier Sense Receiver Node 1 BSY Node 2 BSY

Throughput after Random RTS validation With Attack With Random RTS Validation

More Experimental result Throughput

More Experimental result Delay

Future Direction Experiment with random scenarios. Lone CTS is a great problem! How about in mobile environment? Can we tell with reasonable confidence that the hidden node problem is a solved problem??

Refernces [1] MACA-P: A MAC for Concurrent transmissions in Multi-hop Wireless Networks, Arup Acharya, archan Misra and Sorav Bansal. [2] RTS/CTS-Induced Congestion in Ad Hoc Wireless LANS, Saikat Ray, Jeffrey B. Carruthers and David Starobinski. [3] Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming, Dazhi Chen, Jing Deng, and Pramod K. Varshney. [4] 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, John Bellardo and Stefen Savage.

End!