International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 2589~2599
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp2598-2599 2589
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Security-aware fair transmission scheme for 802.11 based
cognitive IoT
Hayoung Oh
DASAN University College, Ajou University, South Korea
Article Info ABSTRACT
Article history:
Received Mar 29, 2019
Revised Nov 24, 2019
Accepted Dec 9, 2019
Cognitive IoT is exponentially increased because of various real time and
robust applications with sensor networks and big data analysis. Each IoT
protocol of network layer can be RPL, COAP and so on based on IETF
standards. But still collision problems and security-aware fair transmission
on top of scalable IoT devices were not solved enough. In the open wireless
LAN system based cognitive IoTs, IoT node that is continuously being
stripped of its transmission opportunity will continue to accumulate packets
to be sent in the butter and spoofing attacks will not allow the data transfer
opportunities to be fair. Therefore, in this paper, we propose a method to
reduce the average wait time of all packets in the system by dynamically
controlling the contention window (CW) in a wireless LAN based cognitive
IoT environment where there are nodes that do not have fair transmission
opportunities due to spoofing attacks. Through the performance evaluation,
we have proved that the proposed technique improves up to 80% in terms of
various performance evaluation than the basic WLAN 802.11 based IoT.
Keywords:
Cognitive IoT
DCF (distributed coordination
function)
IEEE 802.11
Queue management
Security-aware fair
transmission
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Hayoung Oh,
DASAN University College, Ajou University,
Suwon 16499, South Korea.
Email: hyoh79@gmail.com
1. INTRODUCTION
With the development of cognitive IoTs (CIoTs) [1] with sensors and big data analysis [2], real time
and robust applications are exponentially attended all over the world [3-8]. Even though those techniques
were famous with the reflection of IETF standards such as Orchestra [9], RPL (IPv6 Routing Protocol for
Low power and Lossy Networks) [10], TSCH (Time Slotted Channel Hopping MAC) [11] and COAP
enough years ago, the exact and strict solutions for secure wireless transmission of cognitive IoTs were not
provided in the research and other areas in practice.
In the 802.11 protocol, the concept of a fundamental mechanism for accessing media is DCF.
The DCF is a standard CSMA/CA access mechanism, back-off time is used to avoid collisions by checking
whether the wireless channel is empty before the transmission. In DCF, the more nodes competing, the more
likely it is that collisions will occur and the transmission will not be fair. Many researches has been done to
solve this problem. But those were not considered in CIoTs environment enough. For example, when
a collision occurs, the backoff of the corresponding node exponentially increases, the backoff of other nodes
increases linearly [12, 13], and when the transmission is completed, a new backoff algorithm that linearly
reduces the backoff of all nodes. A method of allocating different CW values according to the number of
collisions occurring in the nodes is proposed [14].
Figure 1 shows Media Access Control (MAC) Layer 2 attacks in 802.11 based CIoT. An attacker of
MAC can transmit packets using a spoofed source MAC address of an access point at any time. The recipient
of these spoofed frames has no way of identifying if they are legitimate or illegitimate requests and will
process them. The ability to transmit spoofed management frames causes MAC layer DoS attacks on an open