9
Research Article The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms Trong-Minh Hoang, 1 Van-Kien Bui, 2 and Thanh-Tra Nguyen 1 1 Posts and Telecommunications Institute of Technology, Hanoi, Vietnam 2 Panasonic R&D Center, Hanoi, Vietnam Correspondence should be addressed to Trong-Minh Hoang; [email protected] Received 11 July 2016; Revised 25 October 2016; Accepted 29 December 2016; Published 14 February 2017 Academic Editor: Francesco Gringoli Copyright © 2017 Trong-Minh Hoang et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC) layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy. 1. Introduction IEEE 802.11 based wireless networks are presented as one of the most widely deployed wireless technologies in the world to provide many applications for both special and commercial domains nowadays. e original IEEE 802.11 MAC layer employs the carrier sense multiple access/collision avoidance (CSMA/CA) protocol with binary exponential backoff algorithm to get fair multiple access [1]. To enhance the performance, several alternative backoff algorithms were proposed in recent years. Among them, the Exponential Increase Exponential Decrease (EIED) backoff algorithm can be substituted for BEB in some scenarios due to its good performance [2, 3]. Likely characteristics of common wireless networks, net- work performance of the IEEE 802.11 based network can be violated by several native or smart attacks from both inside or outside aspects. Particularly, the backoff procedure in a node can be affected by attacks that make a normal node become a malicious node, in which, backoff freezing problem comes to the serious issue while stopping backoff process of several nodes around the malicious node. However, to the best of our knowledge, previous analytical models did not consider the backoff freezing problem and EIED simulta- neously. Furthermore, the performance of different backoff algorithms in IEEE 802.11 MAC layer misbehavior has been never compared in literature. is paper proposes a novel analytical model to ana- lyze and validate a saturated IEEE 802.11 wireless network employing BEB or EIED backoff algorithm in case of existing misbehavior nodes. Particularly, the numerical results of net- work performance for both BEB and EIED backoff algorithms are presented to compare in main parameters. e paper is organized as follows: In Section 2 we briefly review the state of the art of related studies. Section 3 presents our proposed analytical model. We adopt some main simulation results with our analysis in Section 4 and our conclusions and future works are drawn in Section 5. Hindawi Security and Communication Networks Volume 2017, Article ID 2459780, 8 pages https://doi.org/10.1155/2017/2459780

The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

Research ArticleThe Performance Evaluation of an IEEE 802.11Network Containing Misbehavior Nodes under DifferentBackoff Algorithms

Trong-Minh Hoang,1 Van-Kien Bui,2 and Thanh-Tra Nguyen1

1Posts and Telecommunications Institute of Technology, Hanoi, Vietnam2Panasonic R&D Center, Hanoi, Vietnam

Correspondence should be addressed to Trong-Minh Hoang; [email protected]

Received 11 July 2016; Revised 25 October 2016; Accepted 29 December 2016; Published 14 February 2017

Academic Editor: Francesco Gringoli

Copyright © 2017 Trong-Minh Hoang et al. This is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properlycited.

Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically,the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading networkperformance. In recent years, there are several studies using analytical model to analyze medium access control (MAC) layermisbehavior issue to explore this problem but they have focused on binary exponential backoff only.Moreover, a practical conditionsuch as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical modelof the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters.Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under sometypical attacks through numerical simulation results would be easy.

1. Introduction

IEEE 802.11 based wireless networks are presented as oneof the most widely deployed wireless technologies in theworld to provide many applications for both special andcommercial domains nowadays. The original IEEE 802.11MAC layer employs the carrier sensemultiple access/collisionavoidance (CSMA/CA) protocol with binary exponentialbackoff algorithm to get fair multiple access [1]. To enhancethe performance, several alternative backoff algorithms wereproposed in recent years. Among them, the ExponentialIncrease Exponential Decrease (EIED) backoff algorithm canbe substituted for BEB in some scenarios due to its goodperformance [2, 3].

Likely characteristics of common wireless networks, net-work performance of the IEEE 802.11 based network can beviolated by several native or smart attacks from both insideor outside aspects. Particularly, the backoff procedure in anode can be affected by attacks that make a normal node

become amalicious node, in which, backoff freezing problemcomes to the serious issue while stopping backoff process ofseveral nodes around the malicious node. However, to thebest of our knowledge, previous analytical models did notconsider the backoff freezing problem and EIED simulta-neously. Furthermore, the performance of different backoffalgorithms in IEEE 802.11 MAC layer misbehavior has beennever compared in literature.

This paper proposes a novel analytical model to ana-lyze and validate a saturated IEEE 802.11 wireless networkemploying BEB or EIED backoff algorithm in case of existingmisbehavior nodes. Particularly, the numerical results of net-work performance for bothBEB andEIEDbackoff algorithmsare presented to compare in main parameters. The paper isorganized as follows: In Section 2 we briefly review the stateof the art of related studies. Section 3 presents our proposedanalytical model. We adopt some main simulation resultswith our analysis in Section 4 and our conclusions and futureworks are drawn in Section 5.

HindawiSecurity and Communication NetworksVolume 2017, Article ID 2459780, 8 pageshttps://doi.org/10.1155/2017/2459780

Page 2: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

2 Security and Communication Networks

2. Related Work

Network performance of IEEE 802.11 MAC is the interestingaim of recent studies because it is a base step to evaluate andimprove the standard in varying application environments.To approach this, using analytical model is a traditionalmethod due to its clarity. However, the accuracy and com-plexity of a model strongly depend on precise assumptions.Hence, the simple and accurate model proposed by Bianchi[4] has been initiated to number of papers which enhancemore conditions for compensating accuracy such as thebackoff freezing issue that has been fully considered in [5–7].However, the previous proposals are focused to analyze thebinary exponential backoff algorithm only.

An Exponential Increase Exponential Decrease backoffalgorithm was proposed in [2] which has got several inter-esting characteristics. Numerical results in [2, 3] show thatthroughput improvement of IEEE 802.11 saturated networkwith EIED backoff algorithm overcame BEB backoff algo-rithm in the same conditions. Unfortunately, backoff freezingphenomenon in these studies has not been mentioned.

IEEE 802.11 MAC layer misbehavior can be caused bynaive attack or smart attack in [8] and several attacks modifythe backoff algorithm as declared in [9]. To the best of ourknowledge, several proposals are based on the Markov chain[4] to validate network performance parameter for the caseof having misbehavior nodes [10–12]. However, these modelsignored the backoff freezing issue and investigated the BEBalgorithm only. Hence, our analytical model is proposedto compensate a lack of previous studies for evaluatinginfluenced performance under common attacks in terms ofthroughput and delay parameters.

3. The Proposed Analytical Model

3.1.TheBackoffAlgorithmStateModel. Consider a single-hopIEEE 802.11 wireless network in saturated traffic condition.The network contains two kinds of node as normal node andmisbehavior node, which contained cheating backoff rules.The number of nodes in the network is n, and the numberof misbehavior nodes is 𝑙. The IEEE MAC layer is employedby BEB or EIED backoff algorithm in all normal nodes.Let 𝜏1, 𝑝1, 𝜏2, 𝑝2 be transmission probability and collisionprobability for two kinds of node, respectively. Note thatany formula without notation (BEB) or (EIED) indicates thatit is used for both cases of network using BEB and EIEDalgorithm. Denote by 𝜏1(BEB) the transmission probabilityof normal node when it employed BEB backoff algorithmand 𝜏1(EIED) for a normal node employing EIED backoffalgorithm. Assume all channel in the network is no proneerror and there is no hidden terminal problem.

The backoff state of a node employing BEB algorithm ismodelled by a 2-dimensionMarkov chain [5]. Two stochastic

processes are presented to backoff stage𝑠(𝑡) and backoff timecounter value 𝑏(𝑡). For convenience, let 𝑊min, 𝑊max, 𝑊𝑗denote CWmin + 1, CWmax + 1, and CW𝑗 + 1 in the jthretry/retransmission, 𝑚 is the maximum backoff stage, and𝑅 is the maximum retry limit.The contention window size ofBEB algorithm is illustrated as follows:

𝑊𝑗 ={{{{{{{{{

2𝑗𝑊0 = 2𝑗𝑊min, 𝑗 ∈ [0,𝑚 − 1] , 𝑅 > 𝑚2𝑚𝑊0 = 2𝑚𝑊min, 𝑗 ∈ [𝑚, 𝑅] , 𝑅 > 𝑚2𝑗𝑊0 = 2𝑗𝑊min, 𝑗 ∈ [0, 𝑅] , 𝑅 ≤ 𝑚,

(1)

in which 𝑚 = log2(𝑊max/𝑊min) and𝑊min = 𝑊0. The trans-mission probability of a normal node using BEB algorithm isgiven by

𝜏1 (BEB)= 1 − 𝑝1𝑅+11 − 𝑝1

2∑𝑅𝑖=0 𝑝1𝑖 (2𝑖𝑊0 + 1) − (1 − 𝑝1𝑅+1) .

(2)

The EIED backoff algorithm was introduced in [2],where the contention window size is doubled after everyunsuccessful transmission and is halved after each successfultransmission. Whenever the retry counter reaches the limitvalue, the CW is kept and not reset to zero. It can be describedas follows.

After a successful transmission, the contention windowdecreases as a constant value 𝑟𝐷:

CW = max [(CW + 1)𝑟𝐷 ,CWmin + 1] − 1. (3)

After an unsuccessful transmission, the contention win-dow increases as a constant value 𝑟𝐼:

CW = min [𝑟𝐼 × (CW + 1) ,CWmax + 1] − 1. (4)

In this paper, we focus on a special case of EIEDalgorithm, where 𝑟𝐼 = 𝑟𝐷 = 2. A backoff state model ofa node based on two-dimension Markov chain is illustratedin Figure 2. The state (𝑖+, 𝑘) indicates that a node has asuccessful transmission, and the state (𝑖−, 𝑘) indicates that anode stays in backoff process when a transmission is failed.Due to the anomalous slots, we can consider a window𝑊𝑖+ =𝑊𝑖 − 1 to include the first idle backoff slot after a successfultransmission [5].

Denote by 𝑏𝑗,𝑘 = lim𝑡→∞Pr{𝑠(𝑡) = 𝑗, 𝑏(𝑡) = 𝑘} thestationary probability of backoff state (j, k). The probabilitythat a node transmits during a generic slot time is equal tothe sum of all stationary states with 𝑘 = 0. The transitionprobabilities of the Markov model are given as follows:

P {𝑖+, 𝑘 | 𝑖+, 𝑘 + 1} = 1, 𝑘 ∈ [0,𝑊𝑖 − 3] , 𝑖 ∈ [0,𝑚 − 1]P {𝑖−, 𝑘 | 𝑖−, 𝑘 + 1} = 1, 𝑘 ∈ [0,𝑊𝑖 − 2] , 𝑖 ∈ [1,𝑚]

Page 3: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

Security and Communication Networks 3

P {𝑖+, 𝑘 | (𝑖 + 1)+ , 0} = (1 − 𝑝)(𝑊𝑖 − 1) , 𝑘 ∈ [0,𝑊𝑖 − 3] , 𝑖 ∈ [0,𝑚 − 2]

P {𝑖+, 𝑘 | (𝑖 + 1)− , 0} = (1 − 𝑝)(𝑊𝑖 − 1) , 𝑘 ∈ [0,𝑊𝑖 − 3] , 𝑖 ∈ [0,𝑚 − 1]

P {(𝑖 + 1)− , 𝑘 | 𝑖−, 0} = 𝑝𝑊𝑖 , 𝑘 ∈ [0,𝑊𝑖 − 2] , 𝑖 ∈ [1,𝑚 − 1]P {(𝑖 + 1)− , 𝑘 | 𝑖+, 0} = 𝑝𝑊𝑖 , 𝑘 ∈ [0,𝑊𝑖 − 2] , 𝑖 ∈ [0,𝑚 − 1] .

(5)

The first and second lines of 3.1 demonstrate that thebackoff counter is decreased by 1 in duration times 𝑡 and𝑡 + 1. Four remaining equations in 3.1 show that the backoffstage is reduced by 1 after a successful transmission andincreased by 1 after an unsuccessful transmission. Owing tothe chain regularities, there is a simple relation between allstates belonging to the same row (corresponding to the samestage 𝑖):

𝑏𝑖+ ,𝑘 = 𝑊𝑖 − 𝑘 − 1𝑊𝑖 − 1 𝑏𝑖+ ,0;𝑏𝑖− ,𝑘 = 𝑊𝑖 − 𝑘𝑊𝑖 𝑏𝑖− ,0.

(6)

The equations in (7) and in (8) modelled the horizontalrelation between all states that backoff counter is equal tozero:𝑏𝑖− ,0 = (𝑏(𝑖−1)+ ,0 + 𝑏(𝑖−1)− ,0) × 𝑝1, 2 ≤ 𝑖 ≤ 𝑚 − 1𝑏𝑖+ ,0 = (𝑏(𝑖+1)+ ,0 + 𝑏(𝑖+1)− ,0) × (1 − 𝑝1) , 1 ≤ 𝑖 ≤ 𝑚 − 2. (7)

At the first and the last stage, we have

𝑏0+ ,0 = (𝑏0+ ,0 + 𝑏1+ ,0 + 𝑏1− ,0) × (1 − 𝑝) ,𝑏(𝑚−1)+ ,0 = 𝑏𝑚− ,0 × (1 − 𝑝) ,

𝑏1− ,0 = 𝑏0+ ,0 × 𝑝,𝑏𝑚− ,0 = (𝑏(𝑚−1)− ,0 + 𝑏(𝑚−1)+ ,0 + 𝑏𝑚− ,0) × 𝑝.

(8)

By using an inductive method for this calculation, weobtain that

𝑏𝑖+ ,0 = 𝑝1𝑖+1(1 − 𝑝1)𝑖 𝑏0+ ,0,

𝑏𝑖− ,0 = 𝑝1𝑖(1 − 𝑝1)𝑖−1 𝑏0+ ,0.(9)

Denote 𝑥 = 𝑝1/(1 − 𝑝1). Since all the states can beexpressed as a function of the probabilities, by imposing thenormalization condition, we can solve the Markov chain:

1 = 𝑚−1∑𝑖=0

𝑊𝑖−2∑𝑘=0

𝑏𝑖+,𝑘 + 𝑚∑𝑖=1

𝑊𝑖−1∑𝑘=0

𝑏𝑖− ,𝑘

= 𝑚−1∑𝑖=0

𝑏𝑖+,0𝑊𝑖2 + 𝑚∑𝑖=1

𝑏𝑖− ,0𝑊𝑖 + 12

= 𝑏0+ ,02 (𝑊0 + 𝑝𝑚−1∑𝑖=1

𝑥𝑖𝑊𝑖)

+ 𝑏0− ,02 ((1 − 𝑝)𝑚−1∑𝑖=1

𝑥𝑖 (𝑊𝑖 + 1) + 𝑥𝑚 (𝑊𝑚 + 1)) .(10)

The transmission probability of a normal node whenusing EIED algorithm is

𝜏1 (EIED) = 𝑚−1∑𝑖=0

𝑏𝑖+ ,0 + 𝑚∑𝑖=1

𝑏𝑖− ,0 = 1 − 𝑥𝑚+11 − 𝑥 𝑏0+ ,0. (11)

Given the transmission probability of normal node 𝜏1 andmisbehavior node 𝜏2, we can express a conditional collisionprobability of a normal node through a probability that atagged node gets a transmission, which is originated by atleast one of the contending nodes:

𝑝1 = 1 − (1 − 𝜏1)𝑛−𝑙−1 (1 − 𝜏2)𝑙 . (12)

In common case, a misbehavior node always has aninitiated backoff window smaller than in normal node.When misbehavior node has a fixed contention windowmechanism, the contention window size is not changed inevery backoff stage. Let 𝑊∗ be equal to the contentionwindow size of misbehavior node plus 1. The backoff counterof a selfish node is chosen randomly from zero to 𝑊∗ − 1.The transmission probability of a misbehavior node can bereduced from (1) as

𝜏2 = 2(𝑊∗ + 1) − (1 − 𝑝2) =2𝑊∗ + 𝑝2 . (13)

The collision probability of misbehavior node is

𝑝2 = 1 − (1 − 𝜏2)𝑛−𝑙 (1 − 𝜏2)𝑙−1 . (14)

Then, we can solve 𝜏1, 𝑝1, 𝜏2, 𝑝2 by using numerical methodbased on (8), (11), (12), (13), and (14) in the case of EIEDalgorithm.

3.2. Channel State Model. To model the IEEE 802.11 MACin wireless multihop fashion, we clarify states around of anode by a channel state model. A backoff freezing process is

Page 4: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

4 Security and Communication Networks

1 − p1

W0 − 1

1 − p1

W0 − 1

1 − p1

W0 − 1

1 − p1

W1 − 1

1 − p1

W0 − 1

1

1

1 1

1

1· · ·

· · ·

· · ·

· · · · · · · · · · · ·

· · ·

· · ·

· · ·

· · ·

0+,W0 − 2

1+,W1 − 2

2+,W2 − 2

0+, 1

1+, 1

2+, 1

0+, 0

1+, 0

2+, 0

p1

W1

p1

W1

p1

W1

p1

W2

p1

W2

1−, 0 1−, 1

2−, 0 2−, 1

1−,W1 − 1

2−,W2 − 1

1 − p1

Wm−1 − 1

1 − p1

Wm−1 − 1

1 − p1

Wm−1 − 1

m − 1+, 1 m − 1+, 01 1

1

1

1

1

1

1 1

1

· · ·m − 1+,Wm−1 − 2

p1

Wm

p1

Wm

p1

Wm

p1

Wm

p1

Wm

m − 1−, 0 m − 1−, 1

m−, 0 m−, 1

m − 1−,Wm−1 − 1

m−,Wm − 1

Figure 1: The backoff state model of a node employing EIED algorithm.

Success 2(S(2))

Wait(W)

Contention(C)

Success 1(S(1))

pS(2)−W pS(1)−W

pW−S(2) pW−S(1)pS(2)−S(2) pS(1)−S(1)

pW−W

pW−C pC−W

Figure 2: Channel state model.

modelled by a channel state model based on Markov chainin Figure 1. The four states are Wait, Success 1, Success 2,and Contention. Wait state is channel state in idle state;Success 1 is channel state which presents a successful trans-mission of a normal node; Success 2 is channel state whichpresents a successful transmission of a misbehavior node;and Contention is a channel state which presents a channelin collision process.

The transition probabilities are explained as follows.

Wait toWait. It is the transition probability from stateWait toitself, and we have

𝑝𝑊−𝑊 = (1 − 𝜏1)𝑛−𝑙 (1 − 𝜏2)𝑙 . (15)

Wait to Success 1. The channel is sensed busy because of asuccessful transmission of a normal node.

𝑝𝑊−𝑆(1) = (𝑛 − 𝑙) × [𝜏1 (1 − 𝜏1)𝑛−𝑙−1 (1 − 𝜏2)𝑙] . (16)

Page 5: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

Security and Communication Networks 5

Wait to Success 2. A misbehavior node accesses the channeland initiates a successful transmission.

𝑝𝑊−𝑆(2) = 𝑙 × [𝜏2 (1 − 𝜏1)𝑛−𝑙 (1 − 𝜏2)𝑙−1] . (17)

Wait to Contention. The channel experiences a collisiondue to some concurrent transmissions. Thus, the transitionprobability fromWait state to Contention state is

𝑝𝑊−𝐶 = 1 − 𝑝𝑊−𝑊 − 𝑝𝑊−𝑆(1) − 𝑝𝑊−𝑆(2). (18)

Success 1 to Success 1. It is the event when a normal nodetransmits multiple consecutive packets. This event indicatesthe influence of DCF freezing/resumption process of thebackoff counter. A normal node employing BEB algorithmsalways starts a transmission at the first backoff stage; hence

𝑝𝑆(1)−𝑆(1) (BEB) = 1𝑊0 . (19)

In case of using EIED algorithm, the probability thata node extracts a new zero backoff counter depends onthe current backoff stage of this node. Denote by 𝑑𝑖 theprobability that a node transmits a new packet at backoffstage 𝑖. We have 𝑑0 = 𝑏0+ ,0, 𝑑1 = 𝑏1+ ,0, . . . , 𝑑𝑚−1 = 𝑏(𝑚−1)+ ,0,and 𝑑𝑚 = 𝑏𝑚−,0 − (∑𝑚−1𝑖=0 𝑑𝑖𝑝𝑚−𝑖1 ). A node can start a newtransmission with zero backoff value if and only if its currentstate belongs to (0+, 0), (1+, 0), . . . , (𝑚−1+, 0). Therefore, thistransition probability can be computed as

𝑝𝑆(1)−𝑆(1) (EIED) = ∑𝑚−10 𝑑𝑖 × (1/𝑊𝑖)∑𝑚−10 𝑑𝑖 . (20)

Success 2 to Success 2.The probability that amisbehavior nodeextracts new zero backoff counter is

𝑝𝑆(2)−𝑆(2) = 1𝑊∗ . (21)

The steady-state probabilities of Markov chain are deter-mined as follows:𝜋𝑊= 11 + 𝑝𝑊−𝐶 + 𝑝𝑊−𝑆(1)/ (1 − 𝑝𝑆(1)−𝑆(1)) + 𝑝𝑊−𝑆(2)/ (1 − 𝑝𝑆(2)−𝑆(2))𝜋𝐶 = 𝜋𝑊 × 𝑝𝑊−𝐶;𝜋𝑆(1) = 𝜋𝑊 × 𝑝𝑊−𝑆(1)1 − 𝑝𝑆(1)−𝑆(1) ;𝜋𝑆(2) = 𝜋𝑊 × 𝑝𝑊−𝑆(2)1 − 𝑝𝑆(2)−𝑆(2) .

(22)

The average length of stationary state of channel model iscalculated as

𝐸 [𝑇] = 𝜋𝑊𝑇𝑊 + 𝜋𝐶𝑇𝐶 + (𝜋𝑆(1) + 𝜋𝑆(2)) 𝑇𝑆. (23)

Here, 𝑇𝑠 is the time the channel is sensed busy because ofa successful transmission, 𝑇𝑐 is the time the channel is sensed

busy by each station during a collision, and𝑇𝑤 is the durationof an empty slot time.

From the view of a node, the average slot duration in thebackoff countdown process is greater than 𝐸[𝑇] because ofthe freezing backoff issue. Hence,

𝐸 [slot] = 𝐸 [𝑇]𝜋𝑊 . (24)

3.3. Performance Parameters. In this section, we derivethroughput, packet drop rate, and delay performance metricsas follows.

(a) Throughput Analysis. The saturation throughput of net-work is defined as the fraction of channel occupied andsuccessfully transmitted payload bits:

Th = (𝜋𝑆(1) + 𝜋𝑆(2)) × 𝐸 [𝑃]𝐸 [𝑇] . (25)

The normalized throughput of a normal node and amisbehavior node can be expressed as follows:

Th1 = 𝜋𝑆(1)𝑛 − 𝑙 × 𝐸 [𝑃]𝐸 [𝑇] ,Th2 = 𝜋𝑆(2)𝑙 × 𝐸 [𝑃]𝐸 [𝑇] .

(26)

(b) Packet Drop Probability. The packet drop probability isdefined as the probability that a packet is dropped when theretry limit is reached and it is equal to

𝑃drop1 = 𝑝𝑅+11 ,𝑃drop2 = 𝑝𝑅+12 . (27)

(c) Access Delay Analysis. The average packet delay for asuccessfully transmitted packet is defined to be the timeinterval from the time the packet is at the head of its MACqueue ready to be transmitted, until an acknowledgement forthis packet is received. The packet delay of a normal nodeemploying BEB algorithm is calculated similar to study in[13], in which 𝐸[𝑇drop] is the average number of slot timesrequired for a packet to experience 𝑅 + 1 collisions in the(0, 1, . . . , 𝑅) retry stages. Thus, 𝑇delay(BEB) = 𝐸[𝑇drop] ×𝐸[slot].

𝑇delay1 (BEB)= 𝑅∑𝑗=0

(𝑊𝑗 + 12 × 𝑝𝑗1 − 𝑝𝑅+111 − 𝑝𝑅+11 ) × 𝐸 [slot] . (28)

The packet delay of a normal node using EIED algorithmis

𝑇delay1 (EIED) = ∑𝑚𝑖=0 𝑇𝑖 × 𝑑𝑖∑𝑚𝑖=0 𝑑𝑖 , (29)

Page 6: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

6 Security and Communication Networks

Table 1: Simulation parameters.

Physical slot time 𝜎 9𝜇sSIFS 16 𝜇sDIFS 34 𝜇sPHY header 128 bitsMAC header 160 bitsRetry limit 7Basic rate 𝑅basic 6MbpsData rate 𝑅data 6Mbps𝐿ACK 304 bits𝐸[𝑃] 12000 bitsCWmin 15CWmax 1023

where𝑇𝑖 is the average delay when a normal node starts at the𝑖th stage in the backoff process, with the probability densityfunction being equal to 𝑑𝑖. For each 𝑖, 𝑇𝑖 is calculated asfollows:

𝑇𝑖 = 𝑅∑𝑗=0

(𝑊min(𝑖+𝑗,𝑚) + 12 × 𝑝1𝑗 − 𝑝1𝑅+11 − 𝑝1𝑅+1 ) × 𝐸 [slot] . (30)

Similarly, the packet delay of misbehavior node is givenby

𝑇delay(2) = 𝑅∑𝑗=0

(𝑊∗ + 12 × 𝑝𝑗2 − 𝑝𝑅+121 − 𝑝𝑅+12 ) × 𝐸 [slot] . (31)

4. Numerical Results and Discussions

To validate the network performance of two backoff algo-rithms for both normal node and malicious node in asaturated wireless single-hop network, we useMATLAB Toolto verify throughput, packet drop probability, and packetdelay parameters. Analytical results will be examined understandard parameters of the IEEE 802.11a as shown in Table 1.

Let 𝐿DATA be the average length of DATApacket, 𝐿DATA =𝐻 + 𝐸[𝑃], where 𝐻 is the length of header which composesphysical header andMACheader.The transmission durationsof DATA and ACK packets are 𝑇DATA = 𝐿DATA/𝑅data; 𝑇ACK =𝐿ACK/𝑅basic.With the basicmechanism, the time durations ofeach steady-state 𝑇𝑊, 𝑇𝑆, 𝑇𝑐 are given by

𝑇𝑊 = 𝜎𝑇𝐶 = 𝑇DATA + SIFS + 𝑇ACK + DIFS

𝑇𝑆 = 𝑇DATA + SIFS + 𝑇ACK + DIFS.(32)

Basic method

Our EIED modelOriginal EIED model

Tinnirello BEB modelOriginal BEB model

10 15 20 25 30 35 40 45 505Number of nodes (n)

3

3.2

3.4

3.6

3.8

4

4.2

4.4

4.6

4.8

Thro

ughp

ut (b

ps)

×106

Figure 3: Network throughput versus number of nodes.

Firstly, we verify network throughput in basicmechanismunder backoff freezing phenomenon with previous studies inthe same input parameters. As seen in Figure 3, the EIEDalgorithm can provide a better throughput more than BEBalgorithm as proven in [2, 3]. Notably, the backoff freezingissue does not change significantly throughput curve butkeeps good value when the number of nodes increases in thiscase.

A misbehavior node chooses a backoff with fixed win-dow to gain more opportunity of channel preemption. Weillustrate the normal node throughput and malicious nodethroughput for bothBEB andEIEDalgorithms.We consider anetwork containing 12 nodes with onemalicious node and itscontentionwindow varying from 2 to 32 as shown in Figure 4.We can see that the throughput of cheating node decreasesvery fast when𝑊∗ value increases. In addition, misbehaviornode in network utilizing EIED algorithm achieves higherthroughput than the case of BEB algorithm.

Figures 5 and 6 show the delays and packet drop ratesof the different backoff algorithms by varying network size.We consider two cases: a network having one maliciousnode whose contention window is equal to 8 and a normalnetwork without any malicious nodes. A misbehavior nodealways keeps a smaller delay and packet drop rate because itsopportunity of channel occupation is higher. Although EIEDalgorithm can provide a better total throughput and reducepacket drop probability, the throughput and delay parameterswhen having a malicious node in network are worse than inBEB algorithm. Therefore, we can conclude that in the caseof using EIED algorithm the fairness of network is reduced ifthere is an attack at MAC layer.

5. Conclusion

Our presented contribution in this paper is twofold. Firstly,we propose a novel analytical model to model IEEE 802.11

Page 7: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

Security and Communication Networks 7

EIEDBEB

Normal nodeMisbehavior node

0

1

2

3

4

5

6

Thro

ughp

ut (b

ps)

×106

5 10 15 20 25 30 350W∗

Figure 4: Single node throughput versus contention window size.

EIEDBEB

Normal node (L = 1)Normal node (L = 0)Misbehavior node (L = 1)

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

Del

ay (s

)

10 15 20 25 30 35 40 45 505n

Figure 5: Delays versus number of nodes.

MAC employing EIED backoff algorithms with freezingbackoff phenomenon covered. Secondly, the network perfor-mance of different backoff algorithms under common attacksatMAC layer is studied through numerical results.We can seethat the performance of EIEDbackoff algorithm is better thanthat of BEB algorithm under normal condition. However,when the network contained malicious node, the networkperformance metrics of the network employing BEB backoffalgorithm are better than those when employing EIEDalgorithm. In our next works, these network performancemetrics will be validated by a discrete simulation tool.

10 15 20 25 30 35 40 45 505n

0

0.01

0.02

0.03

0.04

0.05

0.06

0.07

P (d

rop)

EIEDBEB

Normal node (L = 1)Normal node (L = 0)Misbehavior node (L = 1)

Figure 6: Packet drop rate versus number of nodes.

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this article.

References

[1] IEEE, “IEEE standard for information technology: telecom-munications and information exchange between systems: localand metropolitan area networks: specific requirements—part11: wireless LAN medium access control (MAC) and physicallayer (PHY) specifications,” IEEE Standard 802.11-2007, 2007,Revision of IEEE Std 802.11-1999.

[2] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, “Performanceof reliable transport protocol over IEEE 802.11 wireless LAN:analysis and enhancement,” in Proceedings of the 21st AnnualJoint Conference of the IEEE Computer and CommunicationsSocieties (INFOCOM ’02), vol. 2, pp. 599–607, IEEE, New York,NY, USA, June 2002.

[3] C. Ye, Y. Li, and A. Reznik, “Performance analysis of expo-nential increase exponential decrease back-off algorithm,” inProceedings of the IEEE Global Telecommunications Conference(GLOBECOM ’10), pp. 1–6, Miami, Fla, USA, December 2010.

[4] G. Bianchi, “Performance analysis of the IEEE 802.11 distributedcoordination function,” IEEE Journal on Selected Areas inCommunications, vol. 18, no. 3, pp. 535–547, 2000.

[5] I. Tinnirello, G. Bianchi, and Y. Xiao, “Refinements on IEEE802.11 distributed coordination functionmodeling approaches,”IEEE Transactions on Vehicular Technology, vol. 59, no. 3, pp.1055–1067, 2010.

[6] H. Chen, “Revisit of the Markov model of IEEE 802.11 DCF foran error-prone channel,” IEEE Communications Letters, vol. 15,no. 12, pp. 1278–1280, 2011.

[7] T.-M. Hoang, V.-K. Bui, and T. Nguyen, “Analyzing impacts ofphysical interference on a transmission in IEEE 802.11 meshnetworks,” in Proceedings of the 9th International Conferenceon Telecommunication Systems Services and Applications (TSSA’15), pp. 1–6, November 2015.

Page 8: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

8 Security and Communication Networks

[8] L. Guang, C. Assi, and A. Benslimane, “MAC layer misbehaviorin wireless networks: challenges and solutions,” IEEE WirelessCommunications, vol. 15, no. 4, pp. 6–14, 2008.

[9] V. R. Giri and N. Jaggi, “MAC layer misbehavior effectivenessand collective aggressive reaction approach,” in Proceedings ofthe 33rd IEEE Sarnoff Symposium 2010, 5, 1 pages, April 2010.

[10] C. Liu, Y. Shu, W. Yang, and O. W. W. Yang, “Throughputmodeling and analysis of IEEE 802.11 DCF with selfish node,” inProceedings of the IEEE Global Telecommunications Conference(GLOBECOM ’08), pp. 1–5, New Orleans, La, USA, December2008.

[11] C. Liu, Y. Shu, M. Li, and O. W. W. Yang, “Delay modeling andanalysis of IEEE 802.11 DCF with selfish nodes,” in Proceedingsof the 4th International Conference onWireless Communications,Networking and Mobile Computing (WiCOM ’08), pp. 1–4,Dalian, China, 2008.

[12] K.-J. Park, J. Choi, K. Kang, and Y.-C. Hu, “Malicious or selfish?analysis of carrier sense misbehavior in IEEE 802.11 WLAN,”Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 22, pp.351–362, 2009.

[13] P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, “IEEE 802.11packet delay: a finite retry limit analysis,” in Proceedings of theIEEEGlobal Communication Conference (GLOBECOM ’03), vol.2, pp. 950–954, San Francisco, Calif, USA, December 2003.

Page 9: The Performance Evaluation of an IEEE 802.11 Network …downloads.hindawi.com/journals/scn/2017/2459780.pdf · 2019-07-30 · ResearchArticle The Performance Evaluation of an IEEE

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal ofEngineeringVolume 2014

Submit your manuscripts athttps://www.hindawi.com

VLSI Design

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

DistributedSensor Networks

International Journal of