FIJI: Fighting Implicit Jamming in 802.11 WLANs

نویسندگان

  • Ioannis Broustis
  • Konstantinos Pelechrinis
  • Dimitris Syrivelis
  • Srikanth V. Krishnamurthy
  • Leandros Tassiulas
چکیده

The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer antijamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on a large-scale indoor testbed, under different traffic scenarios, network densities and jammer locations. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In othe...

متن کامل

Convexity Conditions for 802.11 WLANs

In this paper we characterise the maximal convex subsets of the (non-convex) rate region in 802.11 WLANs. In addition to being of intrinsic interest as a fundamental property of 802.11 WLANs, this characterisation can be exploited to allow the wealth of convex optimisation approaches to be applied to 802.11 WLANs.

متن کامل

Complete Single-Channel Solutions to Hidden Terminal Problems in Wireless LANs

We specify and analyze two variants of oor acquisition multiple access protocols for single-channel wireless LANs (WLANs) with hidden terminals. One variant assumes that all stations have the same functionality, and the other assumes base-station control. These are the rst protocols that solve the hidden-terminal problems of single-channel WLANS. Stations use carrier sensing and a three-way han...

متن کامل

Throughput and Fairness Analysis of Channel-hopping Scheme under Smart Jammer Attacks in IEEE 802.11 WLANs

Jamming attack in wireless networks is a severe problem and is easily accomplished by emitting a continuous radio signal. Although the perfect solution to avoid jamming attack does not exist due to the nature of the wireless shared medium, a channel-hopping scheme is considered one of the most effective ways to mitigate jamming attacks. In this paper, I consider various channel-hopping schemes ...

متن کامل

Implicit Block ACK Scheme for IEEE 802.11 WLANs

The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009