Title
Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodes
Abstract
All smartphones and tablets are currently equipped with Network Interface Cards (NIC) that use IEEE 802.11 family to access Wi-Fi networks or communicate in a peer-to-peer model, which is the topic of this paper. This paper presents a novel technique to detect and isolate a rogue user that modified the firmware on the device's NIC card to capture the channel either to disrupt the communication or to illegally increase its own node throughput in a wireless network with hidden nodes present at the expense of other nodes in the network. The attacker modifies the NIC (Network Card Interface) firmware that is using IEEE 802.11 DCF to deviate from the normal back-off mechanism specified by the IEEE standard which significantly increases the successful probabilities of its packet transmissions. The attacker node only backs off one slot every time it has a packet to transmit or when it experiences a collision. As a result, the attacker captures the channel (Bandwidth) and prevents others from sharing the bandwidth. The attacker forces the NIC to have a firmware upgrade that contains the malicious code. The proposed algorithm detects the attacker in a network with the presence of hidden nodes. The paper's main contributions are: a new method to model Markov Chain to account for the hidden nodes' throughputs, a detection algorithm, and an isolation technique to isolate the attacker.
Year
DOI
Venue
2013
10.1109/PRISMS.2013.6927178
Privacy and Security in Mobile Systems
Keywords
Field
DocType
Markov processes,firmware,network interfaces,peer-to-peer computing,wireless LAN,IEEE 802.11 DCF,IEEE 802.11 family,Markov chain model,NIC firmware,Wi-Fi networks,back-off mechanism,device NIC card,hidden nodes,misbehavior detection algorithm,misbehavior isolation,network interface cards,packet transmission probability,peer-to-peer networks,smartphones,DoS Attack,IEEE 802.11,Markov Chain,Network Security,Smartphones Security
Wireless network,Peer-to-peer,Computer science,Network packet,Computer network,Bandwidth (signal processing),Throughput,Network interface controller,Firmware,Network interface
Conference
Citations 
PageRank 
References 
0
0.34
8
Authors
3
Name
Order
Citations
PageRank
Joseph Soryal100.34
Xijie Liu221.39
Tarek N. Saadawi368892.96