Packet-Hiding Methods for Preventing Selective Jamming Attacks
نویسندگان
چکیده
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficu lt to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the adv antages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-t ime packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primit ives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
منابع مشابه
AONT - Based Packet Hiding Method for Preventing Jamming Attacks
Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...
متن کاملPacket Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In...
متن کاملSelective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...
متن کاملA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with th...
متن کاملData Encapsulation To Prevent Jamming Attacks In Wireless Networks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...
متن کامل