Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
نویسندگان
چکیده
Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this paper, we demonstrate that reactive jamming is only effective against channel hopping Wi-Fi devices in non-dense networks and that it is not effective in dense networks. Then, we propose a new jamming attack called “persistent jamming”, which is a modified reactive jamming that is effective in dense networks. The proposed persistent jamming attack can track a device that switches channels using the following two features, and it can attack the specific target or a target group of devices. The first feature is that the proposed attack can use the partial association ID (PAID), which is included for power saving in the IEEE 802.11ac/af/ah frame headers, to track and jam the targets. The second feature is that it is possible to attack persistently based on device fingerprints in IEEE 802.11a/b/g/n legacy devices. Our evaluation results demonstrate that the proposed persistent jamming can improve the attack efficiency by approximately 80% in dense networks compared with the reactive jamming scheme, and it can also shut down the communication link of the target nodes using 20 dBm of jamming power and a 125 ms response time.
منابع مشابه
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...
متن کاملThroughput and Fairness Analysis of Channel-hopping Scheme under Smart Jammer Attacks in IEEE 802.11 WLANs
Jamming attack in wireless networks is a severe problem and is easily accomplished by emitting a continuous radio signal. Although the perfect solution to avoid jamming attack does not exist due to the nature of the wireless shared medium, a channel-hopping scheme is considered one of the most effective ways to mitigate jamming attacks. In this paper, I consider various channel-hopping schemes ...
متن کاملAn effective defensive node against jamming attacks in sensor networks
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communication system to disrupt or prevent signal transmission. In the context of wireless sensor networks (WSNs), jamming is the type of attack which interferes with the radio frequencies used by sensor nodes and may be viewed as a special case of denial of service (DoS) attacks. Herein, we outline the po...
متن کاملA survey on the wi-fi wireless network systems penetration approaches
Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...
متن کاملRobust Wireless Communication for Multi-Antenna, Multi-Rate, Multi-Carrier Systems
Today’s trend of migrating radio devices from hardware to software provides potentials to create flexible applications for both commercial and military use. However, this raises security concerns, as malicious attacks can also be alleviated to break legitimate communications. In this research work, we study and build practical systems to mitigate the impact of some serious jamming threats: high...
متن کامل