1 / 31

Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack

TMTC MCSE S. T. LIANG. Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. Shih-Tsung Liang* and Ming-Yi Weng ** *Department of Mathematics Computer Science Education, Taipei Municipal Teachers College

garry
Download Presentation

Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TMTC MCSE S. T. LIANG Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack Shih-Tsung Liang* and Ming-Yi Weng** *Department of Mathematics Computer Science Education, Taipei Municipal Teachers College **Department of Computer Science and Information Engineering, Da-Yeh University

  2. IEEE 802.11 Media Access Control The FCS False Blocking Attack FCS False Blocking Detection and Recovery Numerical Results Concluding Remarks Outline

  3. DIFS Contention Window Busy Backoff Next Frame Medium Window Slot Time Select random backoff time (in slot) and decrementas long as medium is idle to transmit a frame when the medium is busy IEEE 802.11 Media Access Control • IEEE 802.11 DCF (Distributed Coordination Function) DIFS Medium is idle to transmit a frame after long period of idle medium

  4. EIFS Contention Window Busy Backoff Next Frame Medium Window Slot Time Select random backoff time (in slot) and decrementas long as medium is idle to transmit a frame when the medium is busy IEEE 802.11 Media Access Control • On receiving an FCS error frame EIFS Medium is idle • to give high priority to the retransmission of FCS-error frames • In case of the false CRC module in the receiving site, the longer holdback can deter the malfunctioning station from transmitting error frames, and hence prevent the waste of bandwidth to transmit a frame after long period of idle medium

  5. DIFS Contention Window Busy Backoff Next Frame Medium Window Slot Time Select random backoff time (in slot) and decrementas long as medium is idle to transmit a frame when the medium is busy IEEE 802.11 Media Access Control • After an error-free frame being received DIFS Medium is idle to transmit a frame after long period of idle medium

  6. The FCS False Blocking Attack • A station constantly transmits frames with FCS error Attacking station (DIFS) Wireless bandwidth the attacking station can get higher priority to transmit Contending Other stations nearby (EIFS)

  7. The FCS False Blocking Attack • Impact of the FCS False Blocking attack on network performance (traffic volume) + -

  8. Possible solutions? How about to identify the attacking source? The MAC address matching process may take much more time than FCS calculation The identified MAC address may be a fake FCS error frames still coming from malicious attackers Our approach Does not identify the source Frustrates the malicious behavior The FCS False Blocking Attack

  9. FCS False Blocking Detection and Recovery • The ratio of error_frames to correct_frames error_frames/correct_frames no. of stream video connections

  10. FCS False Blocking Detection and Recovery frame received rcv_frame++ FCS correct? N Y Data Collection Phase error_frame++ correct_frame++ N rcv_frame>detection_count? return Y

  11. FCS_error_flag=0? error_frame/correct_frame >error_threshold && rcv_frame≠error_frame? error_frame/correct_frame <error_threshold FCS False Blocking Detection and Recovery N Y N Y Y Detection and Recovery Phase FCS_error_flag=0 Set IFS to EIFS N FCS_error_flag=1 Not Set IFS to EIFS error_frame=0 correct_frame=0 all_frame=0 return

  12. data data data FCS error attack source data Numerical Results • Simulation set up • Based on Network Simulator v2.27 • Embed the proposed FCS False Blocking detection and recovery mechanism into the 802.11 MAC module of NS2.27 (C++ code implementation) • network topology • FCS error attack source • Constant bit rate • streaming video connections • 150Kbps/300Kbps

  13. Numerical Results • Simulation parameter settings

  14. Numerical Results Scenarios I, II

  15. Numerical Results Scenarios III, IV

  16. Identify a new pattern of 802.11 false blocking attacks—the FCS false blocking attack, in which the attacker continuously transmits data with erroneous FCS values Corresponding detection and recovery mechanism is also proposed and has shown to be able to moderate the impacts to the wireless networks caused by FCS false blocking attacks Under a single attacking source, the FCS False Blocking detection and recovery mechanism can averagely increase the network throughput 5% to 8% Concluding Remarks

  17. Thank you!! Request for Comment

  18. CSMA/CA Error Recovery Mechanisms DCF Access Procedure DCF

  19. Why CSMA/CD doesn’t work? The hidden terminal problem! CSMA/CA STA1 STA2 STA3 STA1can communicate with only STA2. STA2 can communicate with STA1and STA3. STA3 can communicate with only STA2. The frame from STA1to STA2 can be corrupted by a transmission initiated by STA3. The STA3 did not know the ongoing transmission from STA1to STA2

  20. To cope with the hidden terminal problem Medium reservation through the exchange of RTS and CTS frames prior to the actual data CSMA/CA RTS CTS STA2 STA3 STA1 Area cleared by RTS (Request To Send) Area cleared by CTS (Clear To Send)

  21. MAC-Level Acknowledgement Wireless media are noisy and unreliable The source needs to make sure the frame has been correctly received by the destination If the source does not receive the ACK, the source will retransmit the frame CSMA/CA

  22. 4-way MAC frame exchange protocol CSMA/CA Source Destination RTS Collision Protect!! CTS who protect me? (size is the key!!) Data ACK

  23. More about 4-way handshake RTS and CTS may be disabled by the dot11RTSThreshold attribute in the MIB (Management Information Base) If frame length > dot11RTSThreshold → 4-way frame exchange with RTS and CTS If frame length≤dot11RTSThreshold → frame exchange without RTS and CTS The defaultdot11RTSThresholdis 128 In environments STAs can hear from each other, a higher dot11RTSThreshold can reduce the bandwidth consumption on RTS and CTS CSMA/CA

  24. Carrier Sense Mechanism Physical carrier sense Physical layer carrier sense Similar to 802.3 Check for Medium status (Idle/Busy) Virtual carrier sense Mac layer carrier sense Network Allocation Vector (NAV) A countdown counter to record the amount of time remains before wireless channel clear (i.e. NAV=0→clear) CSMA/CA

  25. MAC control logic CSMA/CA Wait for frame to transmit NAV=0 ? Flag=0 Flag=1 Note: The period of time immediately following a busy medium is the highest probability of collision ccurring. Many stations may be waiting for the medium to become idle and attempt to transmit at the same time. Thus whenever the station sensing a busy medium, a random backoff time is used. Check PHY N Medium Idle? Y Collision ? N Y Wait IFS Transmit Frame Flag==0 ? Still Idle ? N Y Y N Random Backoff Time

  26. CSMA/CA • Random backoff time • Backoff time=Random()*aSlotTime • Random():a uniform distributed integer randomly selected from [0,CW], where CW is contention window • For each unsuccessful frame transmission, CW doubles (from CWmin to CWmax) • CW  2 CW+1 • Reduces the collision probability

  27. Error Recovery Mechanisms • Errors (interference, collision) • STA sends an RTS but not receive the CTS • STA sends a data frame but not receive the ACK • Retransmission with retry limit • shortRetryLimit : frame length≤dot11RTSThreshold • longRetryLimit : frame length > dot11RTSThreshold

  28. DCF Access procedure • Interframe space (IFS) • SIFS: Short InterFrame Space • Used for immediate response actions (e.g., ACK, CTS) • PIFS: PCF InterFrame Space • Used by centralized controller in PCF scheme when using polls • DIFS: DCF InterFrame Space • Used by distribution coordination function (DCF) for asynchronous frames contention • EIFS: Extended InterFrame Space • Used by the DCF after indication of the erroneous frame (e.g., FCS error) • Reception of an error-free frame during the EIFS causes the access using EIFS is terminated and normal medium access (using DIFS) continues shortest longest

  29. DIFS Immediate access when medium is free >= DIFS Contention Window PIFS DIFS SIFS Busy Backoff Next Frame Medium Window Slot Time Defer Access Select Slot and decrement backoff as long as medium is idle DCF Access procedure • Basic Access Method

  30. DCF Access procedure • Example of backoff procedure DIFS DIFS DIFS backoff=12 backoff=7 backoff=3 busy STA 1 backoff=5 busy STA 2 DIFS busy STA 3 backoff=9 backoff=4 busy STA 4 • After MSDU arriving at MAC, STA 3 senses medium free for DIFS, so it initiates transmission • immediately without backoff interval • For STA 1,2, and 4, their DIFS intervals are interrupted by STA 3. Thus, the backoff • Intervals for STA 1, 2, and 4, are generated randomly (e.g., 12, 5, and 9, respectively) • After transmission of STA 2, the remaining backoff interval of STA 1 is (12-5) = 7. • After transmission of STA 2, the remaining backoff interval of STA 4 is (9-5) = 4. • After transmission of STA 4, the remaining backoff interval of STA1 is (7-4) = 3.

  31. DCF Access procedure • Example of backoff procedure (continue) DIFS DIFS DIFS backoff=9 backoff=4 busy STA 1 backoff=5 backoff=20 backoff=16 busy STA 2 DIFS busy STA 3 backoff=5 backoff=18 backoff=14 busy busy STA 4 • STA 3 senses medium free for DIFS and initiates transmission immediately • For STA 1,2, and 4, their DIFS intervals are interrupted by STA 3. Thus, the backoff • Intervals for station 1, 2, and 4, are generated randomly (e.g., 9, 5, and 5, respectively) • Collision occurs between STA 2 and 4. • After the collision of STA 2 and 4, the remaining backoff interval of station 1 is (9-5) = 4. • The backoff Intervals for retransmission of STA 2, and 4, are generated randomly (e.g., 20 and 18, respectively). (tend to be larger the initial attempt)

More Related