Countermeasuring Aggressors via Intelligent Adaptation of Contention Window in CSMA/CA Systems

被引:0
作者
Yazdani-Abyaneh, Amir-Hossein [1 ,2 ]
Hirzallah, Mohammed [1 ,3 ]
Krunz, Marwan [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
[2] CelPlanTechnol Inc, Reston, VA 20191 USA
[3] Qualcomm Technol, San Diego, CA 92121 USA
关键词
Aggressive behavior; CSMA/CA; CWmin; distributed MAC; fairness; machine learning; random forest; IEEE-802.11; MECHANISM; EFFICIENT;
D O I
10.1109/ACCESS.2024.3416232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To coordinate channel access and reduce collisions over unlicensed bands, wireless technologies implement a listen-before-talk (LBT) strategy, a variant of Carrier Sense Multiple Access (CSMA) with Collision Avoidance (CA). In LBT, a node backs off for a randomly selected amount of time, upper-bounded by the minimum contention window (CWmin) which is specified by standard settings. However, an aggressive node can choose a lower CWmin value, deviating from standards settings, to gain an unfair throughput advantage at the cost of compliant nodes performance. To address this problem, we propose a framework called Intelligent Contention Window (ICW) that allows compliant nodes to adapt their CWmin values to counter aggressive nodes and achieve their fair share of the channel's airtime. The adaptation process is based on a random forest, a machine learning model that includes a large number of decision trees. We train the random forest in a supervised manner to recommend the possible best CWmin over a large number of spectrum sharing scenarios. Our results show high generalization performance of the random forest for diverse aggressive spectrum sharing settings. We validate our design using over-the-air hardware experiments as well as simulations. Our results suggest that under ICW, nodes receive their fair shares of the channel airtime and achieve multi-fold boosting in throughput and reduction in latency in both static and dynamic aggression settings. Our SDR experiments show 5.62x throughput improvement when ICW is used relative to the Wi-Fi protocol.
引用
收藏
页码:88216 / 88230
页数:15
相关论文
共 45 条
[1]   CSI-based authentication: Extracting stable features using deep neural networks [J].
Abyaneh, Amirhossein Yazdani ;
Pourahmadi, Vahid ;
Foumani, Ali Hosein Gharari .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
[2]  
Abyaneh M., 2019, P IEEE INT S DYN SPE, P1
[3]  
[Anonymous], 2021, LabVIEW Communications 802.11 Application Framework V2.1.
[4]  
[Anonymous], 2016, IEEE Standard 802.11-2016 (Revision of IEEE Std 802.11-2012, DOI [DOI 10.1109/IEEESTD.2016.7460875, 10.1109/IEEESTD.2016.7786995, DOI 10.1109/IEEESTD.2016.7786995]
[5]  
[Anonymous], 2017, Google Project Zero: Exploiting Broadcoms Wi-FiStack.
[6]   Friendly Jamming on Access Points: Analysis and Real-World Measurements [J].
Berger, Daniel S. ;
Gringoli, Francesco ;
Facchi, Nicolo ;
Martinovic, Ivan ;
Schmitt, Jens B. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (09) :6189-6202
[7]   Performance analysis,of the IEEE 802.11 distributed coordination function [J].
Bianchi, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (03) :535-547
[8]   Random Access Game and Medium Access Control Design [J].
Chen, Lijun ;
Low, Steven H. ;
Doyle, John C. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (04) :1303-1316
[9]   Adjustment mechanism for the IEEE 802.11 contention window: An efficient bandwidth sharing scheme [J].
Chetoui, Yassine ;
Bouabdallah, Nizar .
COMPUTER COMMUNICATIONS, 2007, 30 (13) :2686-2695
[10]  
Cisco, White Paper: Cisco Visual Networking Index: Forecast and Method-ology