Self Organized Networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Voice over WiFi R 張素熒 R 朱原陞 R 王振宇
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
ECE 256: Wireless Networking and Mobile Computing
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen, Mohammad Malli, Chadi Barakat PLANETE group, INRIA.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Performance Evaluation of L3 Transport Protocols for IEEE (2 nd round) Richard Rouil, Nada Golmie, and David Griffith National Institute of Standards.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.
IEEE MAC Ikjun Yeom. Computer Network Physical Layer: network card, wire/wireless Datalink Layer: data delivery in a link Network Layer: addressing,
Dzmitry Kliazovich, Fabrizio Granelli, University of Trento, Italy
MAC Protocols for Sensor Networks
Computer Communication & Networks
Dzmitry Kliazovich, Fabrizio Granelli, University of Trento, Italy
Architecture and Algorithms for an IEEE 802
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
IEEE e Performance Evaluation
OFDMA performance in 11ax
CT301 LECTURE 8.
Reddy Mainampati Udit Parikh Alex Kardomateas
Topics in Distributed Wireless Medium Access Control
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
TCP-LP Distributed Algorithm for Low-Priority Data Transfer
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Net301 lecture9 11/5/2015 Lect 9 NET301.
CS 457 – Lecture 7 Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
[Preliminary Simulation Results on Power Saving]
Multi-Hop Broadcast from Theory to Reality:
Simulation Results for QoS, pDCF, VDCF, Backoff/Retry
[Preliminary Simulation Results on Power Saving]
Multicast/Broadcast Communication With Acknowledge
Enhanced MAC proposal for high throughput.
DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
The Impact of Multihop Wireless Channel on TCP Performance
Wireless LAN Simulation IEEE MAC Protocol
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
Is the MAC sufficient for wireless high speed mesh LANs?
DL MU MIMO Error Handling and Simulation Results
OFDMA performance in 11ax
Horizon: Balancing TCP over multiple paths in wireless mesh networks
Wireless MAC Multimedia Extensions Albert Banchs, Witold Pokorski
Presentation transcript:

Self Organized Networks Doctoral School ICI Course Project Self Organized Networks CLASS : a Cross-Layer Attack, Subtle and Simple Alaeddine EL-FAWAL LCA : Laboratory for computer Communications and Applications February 6th, 2004

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Simulation Detection Perspectives Conclusions Our Attack

Facts & Objectives Facts : Objectives : Hotspots anywhere 24,000 world-wide soon 100 so far in Switzerland Given the limited bandwidth: Attacks are benificial!! (Gain in banwidth and money ) At the network layer : (well discussed in the literature) What about MAC layer ? (Rarely discussed) MAC layer protocol : 802.11 Objectives : Find vulnerabilities in 802.11. Protect 802.11. We are concerned in rational behavior.

Facts & Objectives Misbehavior scenario Well-behaved node Cheater

OUTLINE Related Work Facts and Objectives Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Existing Attacks : (Rational Cheater) Related Work Existing Attacks : (Rational Cheater) Specially based on manipulating backoff time /DIFS: Decreasing Backoff / DIFS  Increasing Priority A cheater can: Change his own Parameters : Reduce Contention Windows. Transmit before DIFS ... increase cheater´s priority Act directly against other nodes : Selectively scramble others´ Pkts . Others will increase their Contention Windows. decrease other nodes´ priorities

Related Work Existing Solutions 1 - Proposed by Kyasanur and Vaidya : Concept: the receiver assigns backoff values to the sender Detection: compare expected and observed backoffs Correction: assign penalty to the cheater Drawbacks: Modification of IEEE 802.11 The receiver can control the sender Only one traffic pattern Only one type of misbehavior

Related Work Existing Solutions 2 – DOMINO Solutions : Station sends before DIFS: Easily detectable after few packets CTS/ACK scrambling: Detectable using the number of retransmissions Manipulated backoff: more subtle Detection metrics Throughput and delay ? NO because: Traffic dependent Subject to many factors Backoff ? YES but: Cannot be distinguished if the sender has large delays Collisions lead to confusing situations

Motivation for our Proposal OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Motivation for our Proposal The Above Attacks The Above Attacks are Uplink (Cheater  AP) Realistic traffic Downlink AP belongs to ISP : Trusted Node. The above Attacks are not relevant anymore Furthermore 90% of traffic : TCP (http, FTP, ...) To kill TCP connections : network layer Attacks (dsniff) BUT Fail in presence of Authentication (IPsec)

Motivation for our Proposal Efficient Smart Attack against TCP on the downlink. At the MAC Layer. First Attack that combines 802.11 and TCP Vulnerabilities Transparent to TCP and MAC: Hard to detect. Efficient even when using IPsec

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Our Attack Uses the following 802.11 vulnerability : MAC Frame Header Copying of transmitter address (AP) MAC-ACK No Authentication, No source Address

Our Attack Attack Description Simple Scenario : Sc S Mc M INTERNET Well-behaved node‘s Pkts AP Queue Cheater‘s Pkts MAC-ACK TCP AP TCP TCP Pkt is lost. AP knows nothing about this loss. It dequeues the frame. (No retransmissions) TCP decreases its window. Repeated loss  killed TCP connection

Result: increasing the cheater’s Throughput Our Attack Attack Description General Case : Jam all TCP Pkts or TCP-ACKs that don´t belong to the cheater. Send MAC-ACK to the transmiter. Prob. of jamming : X (X=1, jamming all other nodes‘ Pkts) Cheater´s Benefits : Killing TCP Connections  reducing load at AP & Wireless Channel. Decreasing Delay (No retransmission due to collision) Minimizing Loss Prob. (No Drop at AP) Result: increasing the cheater’s Throughput

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Simulation Simulator : Implementation of the attacks in ns-2.27. To be completely transparent, only TCP traffic is jammed (ctrl. Pkts. are saved) Results are averaged over 5 simulations.

Simulation Simulated Scenario : DCF Mc M INTERNET AP FTP DCF TCP traffic on the downlink (FTP connections). Channel capacity : 1Mbps TCP Pkt size : 1000 Bytes 2 cases : Immediate jamming. Delayed jamming (after a warmup period).

Simulation Immediate Jamming :

Simulation Delayed Jamming (warmup period):

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

This attack is completely Detection Problems : How to distinguish between jamming & collision. Even if jamming is detected, the cheater remains unknown. Downlink jamming is not detectable near the AP. AP signal strength is larger than the jamming signal strength near the AP. Placing sensors near the AP is useless. Existing DOMINO procedures cannot detect it This attack is completely Transparent to MAC and TCP.

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Perspectives To make detection more difficult, the cheater may use On/Off jamming periods. Multiple cheaters. Network collapses. Pareto-optimal point. Applying game theory: the move is to change the jamming prob. BUT: We need to detect the attack. To avoid this attack: Without modifying 802.11. Here is the challenge!! Modifying 802.11. NACK. Authentication.

OUTLINE Facts and Objectives Related Work Motivation for our Proposal Our Attack Simulation Detection Perspectives Conclusions

Conclusions First attack that combines 802.11 & TCP vulnerabilities. Completely transparent: Jamming = collision. MAC-ACK is not authenticated. Very efficient on the downlink as well as on the uplink. More harmful to TCP than UDP flows.

MERCI DE VOTRE ATTENTION