Beruflich Dokumente
Kultur Dokumente
B.BenSujitha
M.Tech,(Ph.D).,
Ponjesly College of Engineering
Nagercoil
bensujitha@gmail.com
Abstract--This paper presents a novel approach for focusing on learning the interference relations and detecting selfish
behavior nodes in the network using Sniffers. The approach requires multiple sniffers across the network for capturing
the wireless traffic traces. These traces are then analyzed using a machine learning approach to infer the carrier-sense
relationship between nodes in the network. This coupled with an estimation of collision probabilities which helps to
deduce the interference relationships. The estimation and detection of misbehaving nodes in networks that are detected
using watch dog algorithm. The misbehavior nodes are detected based on identifying the asymmetry in carrier-sense
behavior between node pairs and finding multiple witnesses to raise confidence.
Index TermsMAC layer misbehavior, Interference, Security, Clear Channel Assessment (CCA).
INTRODUCTION
Wireless networks are computer networks that are
not connected by cables of any kind. The use of a
wireless network enables enterprises to avoid the
costly process of introducing cables into buildings
or as a connection between different equipment
locations. The basis of wireless systems is radio
waves, and the implementation that takes place at
the physical level of network structure. Wireless
networks use radio waves for connecting devices
such as laptops to the Internet, the business network
and applications. Wi-Fi can enable devices to
connect easily with each other without requiring a
wireless access point and to communicate at typical
Wi-Fi speeds for everything from file transfer to
Internet connectivity.When laptops are connected to
Wi-Fi hot spots in public places the connection is
established to that network. One advantage of Wi-Fi
is the ability to connect devices even if they are
from different manufacturers. Only one of the Wi-Fi
devices needs to be compliant with Wi-Fi Direct to
establish a peer-to-peer connection that transfers
data directly between each other with greatly
reduced setup. The pairing of Wi-Fi devices can be
set up to require the proximity of a near field
communication, a Bluetooth signal, or a button press
on one or all the devices.
ISBN 978-93-80609-17-1
599
International Conference on Recent Advances in Mechanical Engineering and Interdisciplinary Developments [ICRAMID - 2014]
ISBN 978-93-80609-17-1
600
International Conference on Recent Advances in Mechanical Engineering and Interdisciplinary Developments [ICRAMID - 2014]
PROPOSED SYSTEM
CSMA/CA TECHNIQUE
The proposed system uses the technique
known as Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA).This is for
analyzing the channel status whether it is busy or
idle. According to this technique, when a node wants
to transmit a frame, the station is required to sense if
the communication medium is busy. If it is, the
station waits for a period of time known as the
Backoff Interval (BO) and then it tries to sense the
medium again. If the channel is not busy, the station
transmits the frame to the intended destination. The
RTS,CTS mechanism is used for communication. A
sender transmits an RTS with information about the
size of the data frame and the channel time to be
consumed by the data frame. If the receive is free to
receive the data frame, it sends a CTS to the sender.
At the same time, other stations in the neighborhood
of the sender-receiver pair record the estimated time
for data transmission and backoff until the channel
becomes free again.
ANALYSING INTERFERENCE
When interference problem appears then it
may cause loss of the data, delay in transmitting
packets. Interference impacts the sender by reducing
its maximum sending rate as determined by the
CSMA based 802.11 MAC layer connections.
Interference impacts the receiver by reducing the
probability of successful packet reception by causing
collisions at the receiver. There are two types of
interference in the proposed system. That includes
1) Sender Side Interference.
2) Receiver Side Interference.
To ensure this model that are applicable to real
networks, it rely on only received signal strength
indicator (RSSI) values and pair-wise delivery
counts. Both are easily obtained by wireless cards.
They record this information when there are a singlesender as experimental at all receivers, which
requires N trials to obtain N2 parameters for an N
node network. Then they formulate low-level models
for packet reception and carrier-sense by relating the
traditional notion of SINR (signal to interference plus
noise ratio) to our measurements. Investigate 802.11
characteristics, both in a controlled setting with
attenuators and on a building network, to provide a
foundation for the models. These models in turn fed
into a higher-layer system model that predicts packet
delivery and interference for the same node
ISBN 978-93-80609-17-1
601
International Conference on Recent Advances in Mechanical Engineering and Interdisciplinary Developments [ICRAMID - 2014]
SNIFFERS
Sniffer machines are used to capture the
wireless frames on the network. This wireless sniffer
captures 256 bytes of each receiving 802.11
frame.This records the complete view of the frame,
i.e., PHY/MAC/LLC/IP/Above-IP information. The
header that includes the useful PHY information such
as MAC Time, RSSI (Received Signal Strength
Indication), SQ (Signal Quality), Signal strength,
Noise, Signal Noise Ratio (SNR) and Data rate (in
Mbps).All signal and noise information are in special
units.They can be used for relative comparison. Here
the sniffer can capture the IEEE 802.11 MAC frame
structure which incorporates the following fields:
protocol version, frame type (management, data and
control), Duration for Network Allocation Vector
(NAV) calculation, BSS Id, Source and Destination
MAC addresses,fragment, sequence number among
others. The location of one or more sniffers which
affects the quantity and quality of frames that can be
captured from the network. With a prior information
about the AP topology and the expected number of
frames transmitted to and from the APs, sniffers can
be purposefully and conveniently placed in the
neighborhood of those APs. The tests shows that the
placement of sniffers in different area for a short
period of time for capturing the snapshot of the
activity of the APs in that area. These tests allowed to
estimate the behavior of network traffic, number of
users, per-AP traffic, and per-channel traffic. The
information obtained from the tests and the
assumption that users of the wireless network were
spread out in different areas, then place six sniffers in
different locations at a particular range differences.
This placement of sniffer allowed us to capture
critical data sets from APs and user devices in and
around the area. The located sniffers can monitor
majority of the traffic transmitted by the users and
APs could be captured.
MISBEHAVING NODES
Carrier sense is a mechanism common to all
modern
wireless
communication
system.
Understanding of the strengths and weaknesses of
carrier sense in the real world has implications for
many wireless systems. The basic idea of carrier
sense are before transmitting, a sender listens to the
channel and assesses whether a nearby node is
transmitting. If no nearby node is transmitting, the
sender transmits without delay. If a nearby node is
ISBN 978-93-80609-17-1
602
International Conference on Recent Advances in Mechanical Engineering and Interdisciplinary Developments [ICRAMID - 2014]
3.
REFERENCES
1.
2.
ISBN 978-93-80609-17-1
603