Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

1 The Case for Heterogeneous Wireless MACs Chun-cheng Chen Haiyun Luo Dept. of Computer Science, UIUC.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
CARA: Collision-Aware Rate Adaptation for IEEE WLANs Presented by Eric Wang 1.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Resilience To Jamming Attacks
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
IEEE Wireless Communication Magazine Design and Performance of an Enhanced IEEE MAC Protocol for Multihop Coverage Extension Frank H.P. Fitzek, Diego.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless Switch Protocol 課程 : 行動計算 學號 :M 學生 : 陳德翰.
Harnessing Mobile Multiple Access Efficiency with Location Input Wan Du * and Mo Li School of Computer Engineering Nanyang Technological University, Singapore.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Presented by Fei Huang Virginia Tech April 4, 2007.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
A QoS MAC Protocol for Differentiated Service in Mobile Ad Hoc Networks Chi-Hsiang Yeh, Tiantong You Queen’s University ICPP 2003’
Effects of Multi-Rate in Ad Hoc Wireless Networks
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Enhancing Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu, Fujitsu Laboratories of America Tamer Nadeem, Siemens Corporate.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Doc.: IEEE /0877r0 Submission July 2013 James Wang (MediaTek)Slide 1 HEW Beamforming Enhancements Date: Authors:
WLAN.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Outline What is Wireless LAN Wireless Transmission Types
CS 457 – Lecture 7 Wireless Networks
Hidden Terminal Decoding and Mesh Network Capacity
Presentation transcript:

Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.

Outline Motivation Background on Hidden Terminal Problem Hidden Terminal based DoS attacks in WLAN Current Work on Diagnosis and Detection

Motivation Hidden terminal problem is usually studied in wireless ad hoc networks Hidden terminal problem for WLAN –HT exists in large WLAN Limited channels: only 3 out of 11 channels are orthogonal to each other To cover a large hotspot, hidden terminal problems may occur because of the deployment of APs –Easy to launch DoS attack to WLAN

Outline Motivation Background on Hidden Terminal Problem Hidden Terminal based DoS attacks in WLAN Current Work on Diagnosis and Detection

What’s Hidden Terminal Problem SDH S sends a packet to D H doesn’t know D is receiving packet and broadcast a packet to another node during S’s sending Two packets are collided at D

Mitigation of HT Problem RTS-CTS-DATA-ACK procedure NAV is included in RTS and CTS SDH RTSCTS DATA ACK

Problem of RTS-CTS WLAN doesn’t enable RTS-CTS by default –RTS and CTS are overhead –In single AP scenario, no HT at all since every clients only communicate with the AP RTS-CTS cannot totally solve HT problem –A packet may not be correctly received if there’s interference whose strength is much weaker than the packet (1/10)

HT Problem Still Exists CTS can’t be received by H H can send P to interfere with DATA SDH RTSCTS DATA P Interference

Outline Motivation Background on Hidden Terminal Problem Hidden Terminal based DoS attacks in WLAN Current Work on Diagnosis and Detection

Hard to deploy WLAN to avoid HT No global deployment in some environments HT Problem in WLAN A B

Example of HT in WLAN

HT based DoS Use two laptops in ad hoc mode Simple: no extra hardware or change of MAC needed Powerful Stealthy

Powerful Attack: Cover Range (1) P~d α, α=4 (usually 2<α<4) Packet can’t be received correctly if interfering packets’ power > 1/10 power of the packet

Powerful Attack: Cover Range (2) AP as sender Receivers in shaded area suffer HT problem

Conclusion on HT Based Attack Powerful –About ½ of the coverage of an AP is affected by HT Stealthy –The victim cannot receive packets from HT –The packets from HT are legal packets –Several factors have the same symptoms: low signals but normal noises Long distance between AP and clients Hidden terminal Phone/Microwave/Bluetooth interference

Current Work on Diagnosis Preliminary ideas: –Pre-define the coverage area –Strategic walk from different directions

Q&A Thanks!

Future Works Identify the reason of low throughput –Long distance between AP and clients –HT problem –Phone/Microwave interference Locate the HT –The victim cannot receive packets from HT –Triangulation approach may not work in indoor environment