Skip to main content

Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5198))

Abstract

This paper presents a work in progress which deals with the problem of node misbehaviour in ad-hoc networks. A realistic approach is used to determine the impact of contention window manipulation and RTS/CTS cheating. It is explained why IEEE 802.11e ad-hoc networks are more prone to misbehaviour. The paper presents simulation results related to the mentioned types of misbehaviour. The analysis is performed for several distinct scenarios, which yields novel results. It is shown under which conditions a misbehaving node can gain a significant advantage over well-behaving nodes. The limitations of the IEEE 802.11e standard in providing QoS in the presence of misbehaving nodes is also presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BenAmmar, N., Baras, J.S.: Incentive compatible medium access control in wireless networks. In: Proceedings From the 2006 Workshop on Game theory For Communications and Networks (GameNets 2006), Pisa, Italy, October 14 (2006)

    Google Scholar 

  2. Cardenas, A.A., Radosavac, S., Baras, J.S.: Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. Technical Report (2004)

    Google Scholar 

  3. IEEE 802.11 Standard for Wireless LAN: Medium Access Control (MAC) and Physical Layer (PHY) Specification. IEEE Inc., New York (1999)

    Google Scholar 

  4. IEEE 802.11e-2005, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements (2005)

    Google Scholar 

  5. Kosek, K., Natkaniec, M., Vollero, L., Pach, A.R.: An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. In: Proc. The International Conference on Information Networking 2008, ICOIN 2008, Korea (January 2008)

    Google Scholar 

  6. Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: International Conference on Dependable Systems and Networks (DSN 2003), p. 173 (2003)

    Google Scholar 

  7. Kyasanur, P., Vaidya, N.H.: Selfish MAC Layer Misbehavior in Wireless networks. IEEE Transactions on Mobile Computing 4(5) (September/October 2005)

    Google Scholar 

  8. MADWiFi – Multiband Atheros Driver for WiFi, http://madwifi.org

  9. Radosavac, S., Baras, J.S., Koutsopoulos, I.: A Framework for MAC Protocol Misbehavior Detection in Wireless Networks. In: Proc. 4th ACM workshop on Wireless security (WiSe), Cologne, Germany (September 2005)

    Google Scholar 

  10. Raya, M., Hubaux, J., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the 2nd international Conference on Mobile Systems, Applications and Services (MobiSys 2004), Boston, MA, USA, June 06 - 09 (2004)

    Google Scholar 

  11. Rong, Y., Lee, S.-K., Choi, H.-A.: Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis. In: Proceedings of INFOCOM 2006, 25th IEEE International Conference on Computer Communications (April 2006)

    Google Scholar 

  12. Szott, S., Natkaniec, M., Canonico, R., Pach, A.R.: Impact of Contention Window Cheating on Single-hop IEEE 802.11e MANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2008), Las Vegas, NV, USA, March 31 – April 4 (2008)

    Google Scholar 

  13. Szott, S., Natkaniec, M., Canonico, R., Pach, A.R.: Misbehaviour Analysis of 802.11 Mobile Ad-Hoc Networks – Contention Window Cheating. In: Med Hoc Net 2007, Corfu, Greece, June 12–15 (2007)

    Google Scholar 

  14. Wiethölter, S., Emmelmann, M., Hoene, C., Wolisz, A.: TKN EDCA Model for ns-2. In: Technical Report TKN-06-003, Telecommunication Networks Group, Technische Universität Berlin (June 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Szott, S., Natkaniec, M., Pach, A.R. (2008). Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85209-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85209-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85208-7

  • Online ISBN: 978-3-540-85209-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics