A measurement driven, 802.11 anti-jamming system

نویسندگان

  • Konstantinos Pelechrinis
  • Ioannis Broustis
  • Srikanth V. Krishnamurthy
  • Christos Gkantsidis
چکیده

Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power control, in mitigating jamming. In the presence of a jammer we find that: (a) the use of popular rate adaptation algorithms can significantly degrade network performance and, (b) appropriate tuning of the carrier sensing threshold allows a transmitter to send packets even when being jammed and enables a receiver capture the desired signal. Based on our findings, we build ARES, an Anti-jamming REinforcement System, which tunes the parameters of rate adaptation and power control to improve the performance in the presence of jammers. ARES ensures that operations under benign conditions are unaffected. To demonstrate the effectiveness and generality of ARES, we evaluate it in three wireless testbeds: (a) an 802.11n WLAN with MIMO nodes, (b) an 802.11a/g mesh network with mobile jammers and (c) an 802.11a WLAN. We observe that ARES improves the network throughput across all testbeds by up to 150%.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study of Jamming Attacks in IEEE 802.11 Networks

Security forms an important part of wireless network communication system. A variety of attacks can be performed on 802.11 MAC thereby compromising the security of the system and also leading to degradation of the system performance. The security attacks can be classified into different categories based on criteria nature of the attack, domain or attack techniques used. In this work we study th...

متن کامل

A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping

This paper considers spectrally efficient anti-jamming system design based on message-driven frequency hopping (MDFH). Unlike conventional FH where the hopping frequencies are determined by a preselected pseudonoise (PN) sequence, in MDFH, part of the message acts as the PN sequence for carrier frequency selection. It is observed that MDFH has high spectral efficiency and is particularly robust...

متن کامل

Performance of IEEE 802.11 under Jamming

We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, ...

متن کامل

On the Hidden Terminal Jamming Problem in IEEE 802.11 Mobile Ad Hoc Networks

This paper addresses recent experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the ‘hidden terminal jamming’ ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, ...

متن کامل

Channel Switch and Quiet Attack: New DoS Attacks exploiting the 802.11 Standard (Demo Proposal)

IEEE 802.11-based wireless networks are being deployed in large numbers in home, business, and public environments but also in critical environments like hospitals or production plants where reliance on their availability is crucial. Despite security mechanisms having been introduced to the standard to ensure confidentiality, integrity, and authenticity, availability remains a particular challe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0906.3038  شماره 

صفحات  -

تاریخ انتشار 2008