Centrally Reserved Access Model to the Medium in Digital Radio Communication Networks
Keywords:
Centrally Reserved Access to the Medium, Synchronization, Random Multiple Access to the Medium, Switching and Control Mean, Subscriber Terminal, IEEE 802.11Abstract
Currently, centrally reserved access to the medium in the digital radio communication networks of the IEEE 802.11 family standards is an alternative to random multiple access to the environment such as CSMA/CA and is mainly used in the transmission voice and video messages in real time. Centrally reserved access to the environment determines the scope of interest in it from attackers. However, the assessment of effectiveness of centrally reserved access to the environment under the conditions of potentially possible destructive impacts was not carried out and therefore it is impossible to assess the contribution of such impacts to the decrease in the effectiveness of such access. Also, the stage establishing of centrally reserved access to the environment was not previously taken into account. Analytical model development of centrally reserved access to the environment under the conditions of destructive influences in digital radio communication networks of the IEEE 802.11 family standards. A mathematical model of centrally reserved access to the environment has been developed, taking into account not only the stage of its functioning, but also the stage of formation under the conditions of destructive influences by the attacker. Moreover, in the model the stage of establishing centrally reserved access to the medium displays a sequential relationship of such access, synchronization elements in digital radio communication networks and random multiple access to the medium of the CSMA/CA type. It was established that collisions in the data transmission channel caused by destructive influences can eliminate centrally reserved access to the medium even at the stage of its establishment. The model is applicable in the design of digital radio communication networks of the IEEE 802.11 family of standards, the optimization of such networks of the operation, and the detection of potential destructive effects by an attacker.
References
2. Titov K.D., Zavalishina O.N. [Assesment of noise immunity of standart data transmissions IEEE 802.11ac under the influence of interference]. Uspekhi sovremennoi radioelektroniki – Advances in modern radio electronics. 2019. no. 12. pp. 191–196 (in Russ.). doi: 10.18127/j20700784-201912-30.
3. Deniau V., Gransart C., Romero G. L., Simon E. P., Farah J. IEEE 802.11n Commu-nications in the Presence of FrequencySweeping Interference Signals. IEEE Transac-tions on Electromagnetic Compatibility. 2017. vol. 59. no. 5. pp. 1625–1633.
4. Scalia L., Tinnirello I., Giustiniano D. Side effects of ambient noise immunity tech-niques on outdoor IEEE 802.11 deployments. In GLOBECOM. Proceedings of the Global Telecommunications Conference. 2008. pp. 1–6.
5. Titov K.D., Lipatov A.O., Zavalishina O.N. [Assessment of noise immunity of IEEE 802.11n communication system in case of intentional interference taking into account the structure of the transmitted data packet]. Teoriya i tekhnika radiosvyazi – Theory and technique of radio communication. 2019. no. 9. pp. 95–107. (In Russ.).
6. Makarenko S.I. [Dynamic Model of Communication System in Conditions the Func-tional Multilevel Information Conflict of Monitoring and Suppression]. Sistemy up-ravleniya, svyazi i bezopasnost' – Systems of Control, Communication and Security. 2015. no. 3. pp. 122–185. (In Russ.).
7. Aganesov A.V., Makarenko S.I. [Aerospace communications network model with traffic routing hierarchical principle]. Radiotekhnicheskie i telekommunikacionnye sistemy – Radio engineering and telecommunication systems. 2015, no. 4, pp. 43–51. (In Russ.).
8. Bojko A.A. [Method of analytical modeling of viruses propagation process in com-puter networks with different topology]. Trudy SPIIRAN – SPIIRAS Proceedings. 2015. no. 5. pp. 196–211. (In Russ.). doi: 10.15622/sp.42.4.
9. Boyko A.A., Obushenko E.Y., Shcheglov A.V. [About synthesis of a full set of test methods of remote information-technical impacts on spatially distributed systems of information-technical tools]. Vestnik Voronezhskogo gosudarstvennogo universiteta – Bulletin of Voronezh State University. 2017. no. 2. pp. 33–45. (In Russ.).
10. Peregudov M.A., Boyko A.A. [Model procedure of random multiple access to the environment type S-ALOHA]. Informacionno-upravljajushhie sistemy – Information-control systems. 2014. no. 6. pp. 75–81. (In Russ.).
11. Peregudov M.A., Boyko A.A. [Estimation of security of a network packet radio from imitation of user's terminals at level of the procedure of random multiple access to the environment type S-ALOHA]. Informacionnye tekhnologii – Information Technology. 2015. no. 7. pp. 527–534. (In Russ.).
12. Peregudov M.A., Semchenko I.A. [Evaluation of efficiency of random multiple access to ALOHA type environment with voice connections, transfer of service commands, text messages and multimedia files in destructive impact conditions]. Trudy SPIIRAN – SPIIRAS Proceedings. 2019. vol. 18. no. 4. pp. 887–911. (In Russ.). doi: 10.15622/sp.2019.18.4.887-911.
13. Peregudov M.A., Steshkovoy A.S., Boyko A.A. [Probabilistic random multiple access procedure model to the CSMA/CA type medium]. Trudy SPIIRAN – SPIIRAS Pro-ceedings. 2018. no. 4. pp. 92–114. (In Russ.). doi: 10.15622/sp.59.4.
14. Peregudov M.A., Boyko A.A. [Model of reserved access procedure to environment of packet radio network]. Telekommunikacii – Telecommunications. 2015. no. 6. pp. 7–15. (In Russ.).
15. Peregudov M.A., Boyko A.A. [Model of power supply control procedure of packet radio network]. Telekommunikacii – Telecommunications. 2015. no. 9. pp. 13–18. (In Russ.).
16. Peregudov M.A., Steshkovoy A.S. [Digital radio networks centralized elements syn-chronization model with random multiple access to the CSMA/CA type medium]. Trudy SPIIRAN – SPIIRAS Proceedings. 2020. vol. 19. no. 1. pp. 128 – 154. (In Russ.). doi: 10.15622/sp.2020.19.1.5.
17. Liu C., Qiu J. Performance study of 802.11w for preventing DoS attacks on wireless local area networks. Wireless personal communications. 2017. no. 95. pp. 1031–1053.
18. Kaur J. Mac Layer Management Frame Denial of Service Attacks. International Conference on Micro-Electronics and Telecommunication Engineering. 2016. pp. 155–160.
19. Filipek J., Hudec L. Securing mobile ad hoc networks using distributed firewall with PKI. IEEE 14th International Symposium on Applied Machine Intelligence and Infor-matics. 2016. pp. 321–325.
20. Yacchirena A., Alulema D., Aguilar D., Morocho D., Encalada F., Granizo E. Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. IEEE International Conference on Automatica. 2016. pp. 1–7.
21. Liu C., Qiu J. Performance study of 802.11w for preventing DoS attacks on wireless local area networks. Wireless personal communications. 2017. no. 95. pp. 1031–1053.
22. Noman H.A., Abdullah S. M., Mohammed H.I. An Automated Approach to Detect Deauthentication and Disassociation Dos Attacks on Wireless 802.11 Networks. In-ternational Journal of Computer Science Issues. 2015. vol. 12. 1694–1784 p.
23. Peregudov M.A., Steshkovoy A.S., Shcheglov A.V. Descriptive Model of Networks Broadband Access Link Layer for the IEEE 802.11 Standards Family. Systems of Control, Communication and Security. 2020. no. 3. pp. 203–221 (in Russ.). doi: 10.24411/2410-9916-2020-10307.
24. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifica-tions. IEEE Computer Society LAN MAN Standards Committee. 1997.
25. IEEE standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements PART 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std. 802.11–2012. 2012. pp. 1–2793.
26. IEEE Standards Association/IEEE Computer Society. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 4: En-hancements for Very High Throughput for Operation in Bands Below 6 GHz. IEEE Std. 802.11–2013. 2013. pp. 1–425.
27. Kanjanavapastit A., Landfeldt B. An Analysis of a Modified Point Coordination Function in IEEE 802.11. Proceedings of IEEE 14th Personal, Indoor and Mobile Radio Communications. 2003. vol. 2. pp. 1732–1736.
28. Sikdar B. An analytic model for the delay in IEEE 802.11 PCF MAC based wireless networks. IEEE Transactions on Wireless Communications. 2007. no. 4. vol. 6. pp. 1542-1560.
29. Qiao D., Choi S., Soomro A., Shin G. Energy-Efficient PCF Operation of IEEE 802.11a Wireless LAN. In Proc. IEEE INFOCOM. 2002. vol. 2. pp. 580–589.
30. Guan Z., Yang Z. J., He M. Energy-efficient analysis of an IEEE 802.11 PCF MAC protocol based on WLAN. Journal of Ambient Intelligence & Humanized Computing. 2018. pp. 1–11.
31. Zheng G., Zhi-Jun Y., Min H. Energy-efficient analysis of an IEEE 802.11 PCF MAC protocol based on WLAN // Journal of Ambient Intelligence and Humanized Compu-ting. 2018. pp. 1–11.
32. Eyadeh, A., Jarrah, M., Aljumaili, A. Modeling and simulation of performance limits in IEEE 802.11 point-coordination function // International Journal of Recent Tech-nology and Engineering. 2019. vol. 8(4). pp 5575–5580.
33. Noman H. M. PCF and DCF Performances Evaluation for a Non Transition 802.11 Wireless Network using OPNET Modular. International Journal of Soft Computing and Engineering. 2017. vol. 7. pp. 2231-2307.
34. Sarmah S., Sharma S. K. Performance Analysis of IEEE 802.11 WLANs by varying PCF, DCF and EDCF to Enhance Quality of service. International Journal of Com-puter Applications. 2016. pp. 138.
35. Dhaliwal A. S. Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g. Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering. 2013. no. 7. pp. 1594–1598.
36. Chen D., Garg S., Kappes M., Trivedi K. Supporting VBR VoIP traffic in IEEE 802.11 WLAN in PCF mode. Avaya Laboratories. 2002. no. 26.
37. Vishnevsky V., Lyakhov A. Analytical Study of IEEE 802.11 PCF for egional and Metropolitan Area Networks. Cybernetics and nformation Techbologies. 2005. vol. 5. no. 2. pp. 117–136.
38. Liu Q., Zhao D., Zhou D. An analytic model for enhancing IEEE 802.11 point coordi-nation function media access control protocol. European transactions on telecommu-nications. 2011. no. 22. pp. 332–338.
39. Kaur I., Bala M., Bajaj H. Performance evaluation of wlan by varying PCF, DCF and enhanced DCF slots to improve quality of service. IOSR Journal of Computer Engineering. 2012. vol. 2. pp. 29–33.
40. Shigeo S., Daiki T. Bistable Behavior of IEEE 802.11 Distributed Coordination Func-tion. 22nd International Symposium on Wireless Personal Multimedia Communica-tions. 2019.
41. Burton M. 802.11 Arbitration. Certified Wireless Network Professional Inc. Durham. 2009. 24 p.
42. Boyko A.A., Peregudov M.A., Semchenko I.A., Steshkovoj A.S. [Optimizing the operation of radio communication networks software package]. Svidetel'stvo ob ofitsial'noi registratsii programm dlya EVM – The Certificate on Official Registration of the Computer Program. 2018. vol. 2018614894. (in Russi.).
43. Peregudov M.A., Degtyarev I.S., Umanskij A.YA., Semchenko I.A., Steshkovoj A.S., SHCHeglov A.V. [Software package for diagnosing digital radio networks]. Svidetel'stvo ob ofitsial'noi registratsii programm dlya EVM – The Certificate on Official Registration of the Computer Program. 2019. vol. 2019665751. (in Russ.).
Published
How to Cite
Section
Copyright (c) Анатолий Сергеевич Стешковой, Максим Анатольевич Перегудов

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms: Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).