+ All Categories
Home > Documents > IEEE 802.11 Wireless LAN

IEEE 802.11 Wireless LAN

Date post: 16-Jan-2016
Category:
Upload: malana
View: 88 times
Download: 0 times
Share this document with a friend
Description:
IEEE 802.11 Wireless LAN. Why Wireless LAN?. Traditional LANs need wires, which may be difficult to set up in some situations. Advantages of Wireless LANs Allow mobility and flexibility Reduced cost Applicable scenarios Offices Building with open area Hybrid with wired LANs. - PowerPoint PPT Presentation
69
IEEE 802.11 Wireless LAN
Transcript
Page 1: IEEE 802.11 Wireless LAN

IEEE 802.11 Wireless LAN

Page 2: IEEE 802.11 Wireless LAN

Why Wireless LAN?

• Traditional LANs need wires, which may be difficult to set up in some situations.

• Advantages of Wireless LANs– Allow mobility and flexibility– Reduced cost

• Applicable scenarios– Offices– Building with open area– Hybrid with wired LANs

Page 3: IEEE 802.11 Wireless LAN

Architectures

Infrastructure-less/ distributed/ad-hoc mode

Infrastructure mode

Page 4: IEEE 802.11 Wireless LAN

Physical Layer

• RF: Spread Spectrum, no licensing required. Resistance to interference– Band: 915-Mhz, 2.4 GHz (worldwide ISM), 5.2 Ghz

– Direct sequence spread spectrum (DSSS)• broaden the signaling band by artificially increasing the

modulation rate using a spreading code. 2M or 10M.

– Frequency hopping spread spectrum (FHSS)• hop from narrow band to narrow band within a wide band,

using each narrow band for a specific time period.

Page 5: IEEE 802.11 Wireless LAN

MAC Layer: Hidden Terminal Problem

• Node B can communicate with A and C both• A and C cannot hear each other• When A transmits to B, C cannot detect the transmission

using the carrier sense mechanism• If C transmits, collision will occur at node B

A B C

Page 6: IEEE 802.11 Wireless LAN

MCAC (Multiple Access with Collision Avoidance)

• When node A wants to send a packet to node B, node A first sends a Request-to-Send (RTS) to A

• On receiving RTS, node A responds by sending Clear-to-Send (CTS), provided node A is able to receive the packet

• When a node (such as C) overhears a CTS, it keeps quiet for the duration of the transfer– Transfer duration is included in RTS and CTS both

A B C

Page 7: IEEE 802.11 Wireless LAN

Reliability

• Wireless links are prone to errors. High packet loss rate detrimental to transport-layer performance.

• Mechanisms needed to reduce packet loss rate experienced by upper layers

• When node B receives a data packet from node A, node B sends an Acknowledgement (Ack).

• If node A fails to receive an Ack, it will retransmit the packet

A B C

Page 8: IEEE 802.11 Wireless LAN

IEEE 802.11 Wireless MAC

• Distributed and centralized MAC components

– Distributed Coordination Function (DCF)– Point Coordination Function (PCF)

Page 9: IEEE 802.11 Wireless LAN

IEEE 802.11 DCF

• Uses RTS-CTS exchange to avoid hidden terminal problem– Any node overhearing a CTS cannot transmit for the

duration of the transfer

• Uses ACK to achieve reliability• Any node receiving the RTS cannot transmit for the

duration of the transfer– To prevent collision with ACK when it arrives at the sender– When B is sending data to C, node A will keep quite

A B C

Page 10: IEEE 802.11 Wireless LAN

Collision Avoidance

• With half-duplex radios, collision detection is not possible

• CSMA/CA: Wireless MAC protocols often use collision avoidance techniques, in conjunction with a (physical or virtual) carrier sense mechanism– Carrier sense: When a node wishes to transmit a

packet, it first waits until the channel is idle– Collision avoidance: Once channel becomes idle, the

node waits for a randomly chosen duration before attempting to transmit

Page 11: IEEE 802.11 Wireless LAN

Congestion Avoidance

• When transmitting a packet, choose a backoff interval in the range [0,cw]– cw is contention window

• Count down the backoff interval when medium is idle– Count-down is suspended if medium becomes busy

• When backoff interval reaches 0, transmit RTS

Page 12: IEEE 802.11 Wireless LAN

Example

data

waitB1 = 5

B2 = 15

B1 = 25

B2 = 20

data

wait

B1 and B2 are backoff intervalsat nodes 1 and 2cw = 31

B2 = 10

Page 13: IEEE 802.11 Wireless LAN

IEEE 802.11 PCF

• Purpose: contention-free data transmission

• System components– Access Point (AP): a coordinator controlling the

medium access in a poll-and-response manner

– Stations: transmit only when being polled

• A LAN operates in PCF or DCF mode– The duration in which PCF operates is called

contention-free period (CFP)– Before/after a CFP, the network operates in DCF.

Page 14: IEEE 802.11 Wireless LAN

IEEE 802.11 PCF• Starting

– AP seizes the medium by using “priority inter-frame space” (PIFS)

– AP sends out a beacon packet to announce the beginning of a CFP (the packet contains the duration of the CFP)

• In a CFP– AP may transmit data packets to any station– AP may send a polling packet to a station

• The polled station replies with a data packet or a NULL packet (when nothing to send)

• Ending– AP sends out an END packert.

Page 15: IEEE 802.11 Wireless LAN

MAC Management

• Synchronization– finding and staying with a WLAN.– Synchronization functions

• Power management– sleeping without missing any messages– power management functions, e.g., periodic sleep,

frame buffering, traffic indication map

• Association and Re-association– joining a network, roaming, moving from one AP to

another, scanning

Page 16: IEEE 802.11 Wireless LAN

Power Management

• 802.11 power off station during idle periods– A station can be in one of three states:

• transmitter on, • receiver only on, • dozing: both transmitter and receivers off

– is transparent to existing protocols– is flexible to support different application

Page 17: IEEE 802.11 Wireless LAN

Power Management

• APs buffer packets for sleeping stations– AP announces which stations have frames buffered– traffic indication map (TIM) sent with every beacon.– All multicasts/broadcasts are buffered

• Time Synchronization Function (TSF) assures AP and power save stations are synchronized– stations wake up periodically to hear a beacon– TSF timer keeps running when stations are sleeping– synchronization allows extreme low power operation

Page 18: IEEE 802.11 Wireless LAN

Summary

• Architectures of Wireless LANs– Infrastructure or infrastructure-less

• MAC– Hidden terminal problem– collision avoidance– DCF and PCF

• MAC management– Power management and others

Page 19: IEEE 802.11 Wireless LAN

Mobile Ad Hoc Networks

Page 20: IEEE 802.11 Wireless LAN

What is a MANET (Mobile Ad Hoc Networks)?• Formed by wireless hosts which may be mobile• No pre-existing infrastructure• Routes between nodes may potentially contain multiple hops

– Nodes act as routers to forward packets for each other– Node mobility may cause the routes change

AB

C

D

AB

C D

Page 21: IEEE 802.11 Wireless LAN

• Advantages: low-cost, flexibility– Ease & Speed of deployment– Decreased dependence on infrastructure

• Applications– Military environments

• soldiers, tanks, planes– Civilian environments

• vehicle networks• conferences / stadiums• outside activities

– Emergency operations• search-and-rescue / policing and fire fighting

Why MANET?

Page 22: IEEE 802.11 Wireless LAN

• Collaboration– Collaborations are necessary to maintain a MANET

and its functionality.– How to collaborate effectively and efficiently?– How to motivate/enforce nodes to collaborate?

• Dynamic topology– Nodes mobility– Interference in wireless communications

Challenges

Page 23: IEEE 802.11 Wireless LAN

• Proactive protocols– Determine routes independent of traffic pattern– Traditional link-state and distance-vector routing protocols are

proactive– Examples:

• DSDV (Dynamic sequenced distance-vector)• OLSR (Optimized Link State Routing)

• Reactive protocols– Maintain routes only if needed– Examples:

• DSR (Dynamic source routing)• AODV (on-demand distance vector)

• Hybrid protocols– Example: Zone Routing Protocol (intra-zone: proactive; inter-

zone: on-demand)

Routing Protocols: Overview

Page 24: IEEE 802.11 Wireless LAN

• Latency of route discovery– Proactive protocols may have lower latency since routes are

maintained at all times– Reactive protocols may have higher latency because a route

from X to Y may be found only when X attempts to send to Y

• Overhead of route discovery/maintenance– Reactive protocols may have lower overhead since routes are

determined only if needed– Proactive protocols can (but not necessarily) result in higher

overhead due to continuous route updating

• Which approach achieves a better trade-off depends on the traffic and mobility patterns

Routing Protocols: Tradeoff

Page 25: IEEE 802.11 Wireless LAN

• J. Broch, D. Johnson, and D. Maltz, “The dynamic source routing protocol for mobile ad hoc networks,” Internet-Draft Version 03, IETF, October 1999.

• When node S wants to send a packet to node D, but does not know a route to D, node S initiates a routing process

• Runs in three phases Route Discovery Route Reply Path Establishment

• Route Discovery Source node S floods Route Request (RREQ) Each node appends own identifier when forwarding RREQ

Dynamic Source Routing

Page 26: IEEE 802.11 Wireless LAN

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

Represents a node that has received RREQ for D from S

M

N

L

Page 27: IEEE 802.11 Wireless LAN

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

Z

YBroadcast transmission

M

N

L

[S]

[X,Y] Represents list of identifiers appended to RREQ

Route Discovery in DSR

Page 28: IEEE 802.11 Wireless LAN

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

[S,E]

[S,C]

Route Discovery in DSR

Page 29: IEEE 802.11 Wireless LAN

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

[S,C,G,K]

[S,E,F,J]

Route Discovery in DSR

Page 30: IEEE 802.11 Wireless LAN

Route Reply in DSR

• Destination D on receiving the first RREQ, sends a Route Reply (RREP)

• RREP is sent on a route obtained by reversing the route appended to received RREQ

• RREP includes the route from S to D on which RREQ was received by node D

Page 31: IEEE 802.11 Wireless LAN

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

RREP [S,E,F,J,D]

Represents RREP control message

Route Reply in DSR

Page 32: IEEE 802.11 Wireless LAN

• Node S on receiving RREP, caches the route included in the RREP

• When node S sends a data packet to D, the entire route is included in the packet header Hence the name source routing

• Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded

Route Reply in DSR

Page 33: IEEE 802.11 Wireless LAN

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

DATA [S,E,F,J,D]

Packet header size grows with route length

Data Delivery in DSR

Page 34: IEEE 802.11 Wireless LAN

Some Other Routing Protocols

• Location information aided protocols• Power-aware protocols• Others …

• e.g., considering the stability of topology

Page 35: IEEE 802.11 Wireless LAN

Location-Aided Routing (LAR)• Y. Ko and N. Vaidya, “Location-aided routing (LAR) in

mobile ad hoc networks,” MobiCom'98.

• Exploits location information to limit scope of route request flood Location information may be obtained using GPS

• Expected Zone is determined as a region that is expected to hold the current location of the destination Expected region determined based on potentially old location

information, and knowledge of the destination’s speed

• Route requests limited to a Request Zone that contains the Expected Zone and location of the sender node

• B. Karp, and H. Kung, “Greedy Perimeter Stateless Routing for Wireless Networks,” MobiCom 2000.

Page 36: IEEE 802.11 Wireless LAN

Power-Aware Routing

• Modification to DSR to make it power aware (for simplicity, assume no route caching): Route Requests aggregate the weights of all traversed

links Destination responds with a Route Reply to a Route

Request if

• it is the first RREQ with a given (“current”) sequence number, or

• its weight is smaller than all other RREQs received with the current sequence number

Page 37: IEEE 802.11 Wireless LAN

Geography Adaptive Fidelity

• Each node associates itself with a square in a virtual grid

• Node in each grid square coordinate to determine who will sleep and how long

[Y. Xu, et al. “Geography Adaptive Fidelity in Routing,” Mobicom’2001]

Grid head

Page 38: IEEE 802.11 Wireless LAN

Research in Other Layers

• Transport layer• A survey: A. Hanbali, E. Altman, P. Nain, “A Survey of

TCP over Mobile Ad Hoc Networks (2004)”.

• Application layer Data management

• e.g., B. Xu, A. Ouksel, and O. Wolfson, "Opportunistic Resource Exchange in Inter-vehicle Ad Hoc Networks," MDM, 2004.

Distributed algorithms

• clock synchronization

• mutual exclusion

• leader election

• Byzantine agreement

Page 39: IEEE 802.11 Wireless LAN

Security in Mobile Ad Hoc Networks

Page 40: IEEE 802.11 Wireless LAN

Problems• Hosts may misbehave or try to compromise security at all

layers of the protocol stack

• Transport layer: securing end-to-end communication Need to know keys to be used for secure communication May want to anonymize the communication

• Network layer: misbehaving hosts may create many hazards May disrupt route discovery and maintenance:

Force use of poor routes (e.g., long routes) Delay, drop, corrupt, misroute packets May degrade performance by making good routes

look bad

• MAC layer: misbehaving nodes may not cooperate Disobey protocol specifications for selfish gains Denial-of-service attacks

Page 41: IEEE 802.11 Wireless LAN

Security in MANET: Agenda

• Key management• Securing communications• Dealing with MAC and Network layer misbehaviors

Page 42: IEEE 802.11 Wireless LAN

Key Management

• Challenges In “pure” ad hoc networks, access to infrastructure

cannot be assumed Network may also become partitioned

• Solutions Distributed public key infrastructure

Self-organized key management Distributed key certification

TESLA Others

Page 43: IEEE 802.11 Wireless LAN

Self-Organized Public Key Management [Capkun03]

• Nodes form a “Certificate Graph” each vertex represents a public key

an edge from Ku to Kw exists if there is a certificate signed by the private key of node u that binds Kw to the identity of some node w.

Ku Kw

(w,Kw)Pr Ku

Page 44: IEEE 802.11 Wireless LAN

• Four steps of the management scheme

• Step 1: Each node creates its own private/public keys.Each node acts independently

Self-Organized Public Key Management [Capkun03]

Page 45: IEEE 802.11 Wireless LAN

• Step 2: When a node u believes that key Kw belongs to node w, node u issues a public-key certificate in which Kw is bound to w by the signature of u

u may believe this because u and w may have talked on a dedicated channel previously

Each node also issues a self-signed certificate for its own key

• Step 3: Nodes periodically exchange certificates with other nodes they encounter Mobility allows faster dissemination of certificates through the

network

Self-Organized Public Key Management [Capkun03]

Page 46: IEEE 802.11 Wireless LAN

• Step 4: Each node forms a certificate graph using the certificates known to that node

Authentication: When a node u wants to verify the authenticity of the public key Kv of node v, u tries to find a directed graph from Ku to Kv in the certificate graph. If such a path is found, the key is authentic.

Self-Organized Public Key Management [Capkun03]

Page 47: IEEE 802.11 Wireless LAN

• Misbehaving hosts may issue incorrect certificates

• If there are mismatching certificates, indicates presence of a misbehaving host (unless one of the mismatching certificate has expired) Mismatching certificates may bind same public key for two

different nodes, or same node to two different keys

• To resolve the mismatch, a “confidence” level may be calculated for each certificate chain that verifies each of the mismatching certificates Choose the certificate that can be verified with high

confidence – else ignore both certificates

Self-Organized Public Key Management [Capkun03]

Page 48: IEEE 802.11 Wireless LAN

• With the previously discussed mechanisms for key distribution, it is possible to authenticate the assignment of a public key to a node

• This key can then be used for secure communication The public key can be used to set up a symmetric key

between a given node pair as well TESLA provides a mechanism for broadcast authentication

when a single source must broadcast packets to multiple receivers

Secure Communication

Page 49: IEEE 802.11 Wireless LAN

• Sometimes security requirement may include anonymity

• Availability of an authentic key is not enough to prevent traffic analysis

• We may want to hide the source or the destination of a packet, or simply the amount of traffic between a given pair of nodes

Secure Communication

Page 50: IEEE 802.11 Wireless LAN

• Traditional approaches for anonymous communication, for instance, based on MIX nodes or dummy traffic insertion, can be used in wireless ad hoc networks as well

Traffic Analysis

Page 51: IEEE 802.11 Wireless LAN

• Mix nodes can reorder packets from different flows, insert dummy packets, or delay packets, to reduce correlation between packets in and packets out

M1 B M2 E

A

M3C

DG

F

Mix Nodes

Page 52: IEEE 802.11 Wireless LAN

• Node A wants to send message M to node G. Node A chooses 2 Mix nodes (in general n mix nodes), say, M1 and M2

M1 B M2 E

A

M3C

DG

F

Mix Nodes

Page 53: IEEE 802.11 Wireless LAN

• Node A transmits to M1message K1(R1, K2(R2, M)) where Ki() denotes encryption using public key Ki of Mix i, and Ri is a random number

M1 B M2 E

A

M3C

DG

F

Mix Nodes

Page 54: IEEE 802.11 Wireless LAN

• M1 recovers K2(R2,M) and send to M2

M1 B M2 E

A

M3C

DG

F

Mix Nodes

Page 55: IEEE 802.11 Wireless LAN

• M2 recovers M and sends to G

M1 B M2 E

A

M3C

DG

F

Mix Nodes

Page 56: IEEE 802.11 Wireless LAN

• If M is encrypted by a secret key, no one other than G or A can know M

• Since M1 and M2 “mix” traffic, observers cannot determine the source-destination pair without compromising M1 and M2 both

Mix Nodes

Page 57: IEEE 802.11 Wireless LAN

Open Problems

• How to select the mix nodes to balance the tradeoff between anonymity and cost be adaptive to node mobility

• Can the mix structure be applied without PKI, i.e., only using symmetric key techniques?

Page 58: IEEE 802.11 Wireless LAN

Wireless

channel

Wireless

channel

Access Point

A B

• Nodes are required to follow Medium Access Control (MAC) rules

• Misbehaving nodes may violate MAC rules

Wireless

channel

Wireless

channel

Access Point

C D

MAC Layer Misbehavior

Page 59: IEEE 802.11 Wireless LAN

• Causing collisions with other hosts’ RTS or CTS

• “Impatient transmitter” Smaller backoff intervals Shorter Inter-frame Spacings

Some Possible Misbehavior

Page 60: IEEE 802.11 Wireless LAN

• Diagnose node misbehavior Catch misbehaving nodes

• Discourage misbehavior Punish misbehaving nodes

• Details will be discussed later in this course

Solutions

Page 61: IEEE 802.11 Wireless LAN

• A node “agrees” to join a route(for instance, by forwarding route request in DSR) but fails to forward packets correctly

• A node may do so to conserve energy, or to launch a denial-of-service attack, due to failure of some sort, or because of overload

• Solutions• Opt I: Detect the attacks tolerate them

• Opt II: Avoid some attacks

Network Layer Misbehavior: Drop/Corrupt/Misroute

Page 62: IEEE 802.11 Wireless LAN

• Verify whether a node has forwarded a packet or not

B DC EA

B sends packet to C

Watchdog Approach

Page 63: IEEE 802.11 Wireless LAN

• Verify whether a node has forwarded a packet or not• B can learn whether C has forwarded packet or not• B can also know whether packet is tampered with if no

per-link encryption

B DC EA

C forwards packet to D

B overhears CForwarding the packet

Watchdog Approach

Page 64: IEEE 802.11 Wireless LAN

• “Pathrater” is run by each node. Each node assigns a rating to each known node Previously unknown nodes assigned “neutral” rating of 0.5 Rating assigned to nodes suspected of misbehaving are set

to large negative value Other nodes have positive ratings (between 0 and 0.8)

• Ratings of well-behaved nodes increase over time up to a maximum So a temporary misbehavior can be overcome by sustained

good behavior

• Routes with larger cumulative node ratings preferred

Watchdog + Pathrater

Page 65: IEEE 802.11 Wireless LAN

• Choose n node-disjoint paths to send the n pieces of information

• Use a route rating scheme (based on delivery ratios) to select the routes

• Acknowledgements for received pieces are sent

• The missing pieces retransmitted on other routes

• Need to be able to detect whether packets are tampered with

Information Dispersal to Tolerate Misbehavior

Page 66: IEEE 802.11 Wireless LAN

• A node may make a route appear too long or too short by tampering with RREQ in DSR

• By making a route appear too long, the node may avoid the route from being used This would happen if the destination replies to multiple

RREQ in DSR

• By making a route appear too short, the node may make the source use that route, and then drop data packets (denial of service)

• Solution Protect route accumulated in RREQ from tampering Removal or insertion of nodes should both be detected

Route Tampering Attack

Page 67: IEEE 802.11 Wireless LAN

• Source-Destination S-D pairs share secret keys Ksd and Kds for each direction of communication

• One-way hash function H available

• MAC = Message Authentication Code (MAC) computed using MAC keys

Ariadne: Detecting Route Tampering

Page 68: IEEE 802.11 Wireless LAN

• Let RREQ’ denote the RREQ that would have been sent in unmodified DSR

• Source S broadcasts RREQ = RREQ’,h0,[]where h0 = HMACKsd(RREQ’)

• When a node X receives anRREQ = (RREQ’, hi, [m list]) it broadcasts RREQ, mi+1

where RREQ = (RREQ’, hi+1, [m list]), mi+1

where hi+1 = H(X, hi) and mi+1=HMACKx(RREQ)

Ariadne: Detecting Route Tampering

Page 69: IEEE 802.11 Wireless LAN

Acknowledgements

Some slides in this talk were based on Nitin Vaidya, Tutorials on Mobile Ad Hoc

Networks Nitin Vaidya, Security and Misbehavior

Handling in Mobile Ad Hoc Networks Guohong Cao, CSE 598B: Wireless LAN


Recommended