A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs
Rights accessRestricted access - publisher's policy (embargoed until 2017-07-06)
The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from the fact that beacon frames are always given preference in IEEE 802.11 networks. An analytical model to define the aforementioned metric is presented and evaluated with experiments and simulations. Furthermore, we evaluate the adversary detection capabilities of our scheme by means of simulations and experiments over a real testbed. The simulation and experimental results indicate consistency and both are found to follow the trends indicated in the analytical model. Measurement results indicate that our scheme is able to correctly detect a malicious entity at a distance of, at least, 120 m. Analytical, simulation and experimental results signify the validity of our scheme and highlight the fact that our scheme is both efficient and successful in detecting an adversary (either a jammer or a cheating device). As a proof of concept, we developed an application that when deployed at the IEEE 802.11 Access Point, is able to effectively detect an adversary. (C) 2015 Elsevier B.V. All rights reserved.
CitationGarcia-Villegas, E., Afaqui, M., Lopez-Aguilera, E. A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs. "Computer networks", 05 Juliol 2015, vol. 86, núm. C, p. 40-56.
|jammerdetection_postPrint.pdf||main article||716.4Kb||Restricted access|