Skip to main content
Top

2022 | OriginalPaper | Chapter

Overcoming Wifi Jamming and other security challenges at the Edge

Authors : Charles J. Gillan, Denis Guilhot

Published in: Computing at the EDGE

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wi-Fi technology is seen as a commodity today because it is very widely used. Given that Wi-Fi involves transmitting electromagnetic waves through the air, it is susceptible to attack vectors, at both the physical and data-link layers, that do not exist in fixed line networks such as Ethernet. Signal jamming impacts the physical layer and attacks the digital signal processing of the modulated electromagnetic waves at the receiving station. Control and management frames exist at the media access control (MAC) sub-layer of the data-link layer. Spoofing of these frames is possible using even single board computers as long as they have Wi-Fi chips that can function as access points. A particular sub-class of attack targets leakage of information from a system, and this kind of attack is primarily concerned with the discovery of the secret information such as encryption keys that underpins modern cryptographic processing. This chapter explains the underlying principles of these aspects of Wi-Fi technology and suggests, where possible, defences against attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in 2014 Federated Conference on Computer Science and Information Systems (FedCSIS) (IEEE, 2014), pp. 1−8 I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in 2014 Federated Conference on Computer Science and Information Systems (FedCSIS) (IEEE, 2014), pp. 1−8
2.
go back to reference A. Alrawais, A. Alhothaily, C. Hu, X. Cheng, Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)CrossRef A. Alrawais, A. Alhothaily, C. Hu, X. Cheng, Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)CrossRef
3.
go back to reference M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M.A. Ferrag, N. Choudhury, et al., Security and privacy in fog computing: Challenges. IEEE Access 5, 19293–19304 (2017)CrossRef M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M.A. Ferrag, N. Choudhury, et al., Security and privacy in fog computing: Challenges. IEEE Access 5, 19293–19304 (2017)CrossRef
5.
go back to reference D.L. Sengupta, V.V. Liepa, Applied electromagnetics and electromagnetic compatibility (Wiley, Hoboken, 2005), p. 467. ISBN 0-471-16549-2CrossRef D.L. Sengupta, V.V. Liepa, Applied electromagnetics and electromagnetic compatibility (Wiley, Hoboken, 2005), p. 467. ISBN 0-471-16549-2CrossRef
7.
go back to reference Gillan, C.J. Fusco, V.F. Optimizing FDTD electromagnetic field computation on distributed networks”, Int. J. Numer. Modell. Electron. Networks Devices Fields, 11, 6, pp. 277-287. https://doi.org/10.1002/(SICI)1099-1204(199811/12)11:6<277::AID- JNM312>3.0.CO;2-O. Gillan, C.J. Fusco, V.F. Optimizing FDTD electromagnetic field computation on distributed networks”, Int. J. Numer. Modell. Electron. Networks Devices Fields, 11, 6, pp. 277-287. https://​doi.​org/​10.​1002/​(SICI)1099-1204(199811/12)11:6<277::AID- JNM312>3.0.CO;2-O.
12.
go back to reference J.G. Proakis, D.K. Manolakis “Digital Signal Processing”, Pearson New International Edition, 4/E, Pearson, ISBN-10: 1292025735, ISBN-13: 9781292025735. J.G. Proakis, D.K. Manolakis “Digital Signal Processing”, Pearson New International Edition, 4/E, Pearson, ISBN-10: 1292025735, ISBN-13: 9781292025735.
15.
go back to reference A. Grant, P. Williams, N. Ward, S. Basker, GPS jamming and the impact on maritime navigation. J. Navig. 62(2), 173–187 (2009)CrossRef A. Grant, P. Williams, N. Ward, S. Basker, GPS jamming and the impact on maritime navigation. J. Navig. 62(2), 173–187 (2009)CrossRef
16.
go back to reference K. Pelechrinis, M. Iliofotou, S.V. Krishnamurthy, Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutorials 13(3), 245–257 (2011)CrossRef K. Pelechrinis, M. Iliofotou, S.V. Krishnamurthy, Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutorials 13(3), 245–257 (2011)CrossRef
17.
go back to reference K. Pelechrinis, C. Koufogiannakis, S.V. Krishnamurthy, On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)CrossRef K. Pelechrinis, C. Koufogiannakis, S.V. Krishnamurthy, On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)CrossRef
19.
go back to reference B. Otis, Y.H. Chee, R. Lu, N.M. Pletcher, J. M. Rabaey An ultralow power MEMS-based two-channel transceiver for wireless sensor networks. Proc. IEEE Symp. VLSI Circuits (2004) B. Otis, Y.H. Chee, R. Lu, N.M. Pletcher, J. M. Rabaey An ultralow power MEMS-based two-channel transceiver for wireless sensor networks. Proc. IEEE Symp. VLSI Circuits (2004)
21.
go back to reference W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005), (New York, 2005), pp. 46–57 W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005), (New York, 2005), pp. 46–57
23.
go back to reference R. Maheswari, S. Rajeswari, A review on types of jamming attack in mobile ad-hoc network, in Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, (2015) R. Maheswari, S. Rajeswari, A review on types of jamming attack in mobile ad-hoc network, in Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, (2015)
24.
go back to reference FCC public notice 202/418-0500, January 27, 2015 Enforcement Advisory No. 2015-01 FCC public notice 202/418-0500, January 27, 2015 Enforcement Advisory No. 2015-01
27.
go back to reference J.R. Tong, R.J. Watson, C.N.V. Mitchell, Singel-receiver sentinel to interference GPS. World 22(7), 38–40 (2011) J.R. Tong, R.J. Watson, C.N.V. Mitchell, Singel-receiver sentinel to interference GPS. World 22(7), 38–40 (2011)
32.
go back to reference P. Nikolaou, Y. Sazeides, A. Lampropoulos, D. Guilhot, A. Bartoli, G. Papadimitriou, A. Chatzidimitriou, D. Gizopoulos, K. Tovletoglou, L. Mukhanov, G. Karakonstantis, On the evaluation of the total-cost-of-ownership trade-offs in edge vs cloud deployments: a wireless- denial-of-service case study. IEEE Trans. Sustain. Comput. (2019) https://doi.org/10.1109/TSUSC.2019.2894018. P. Nikolaou, Y. Sazeides, A. Lampropoulos, D. Guilhot, A. Bartoli, G. Papadimitriou, A. Chatzidimitriou, D. Gizopoulos, K. Tovletoglou, L. Mukhanov, G. Karakonstantis, On the evaluation of the total-cost-of-ownership trade-offs in edge vs cloud deployments: a wireless- denial-of-service case study. IEEE Trans. Sustain. Comput. (2019) https://​doi.​org/​10.​1109/​TSUSC.​2019.​2894018.
33.
go back to reference P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other Systems, in Advances in Cryptology (CRYPTO ’96). Lecture Notes in Computer Science, vol. 1109, (Springer, 1996), pp. 104–113CrossRef P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other Systems, in Advances in Cryptology (CRYPTO ’96). Lecture Notes in Computer Science, vol. 1109, (Springer, 1996), pp. 104–113CrossRef
34.
go back to reference D. Bernstein, Cache-timing attacks on AES, (2005) D. Bernstein, Cache-timing attacks on AES, (2005)
35.
go back to reference D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive (2002) D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive (2002)
36.
go back to reference Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauci, Cryptanalysis of DES implemented on computers with cache, in Cryptographic Hardware and Embedded Systems-CHES 2003, (2003) Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauci, Cryptanalysis of DES implemented on computers with cache, in Cryptographic Hardware and Embedded Systems-CHES 2003, (2003)
37.
go back to reference E. Tromer, D. Osvik, A. Shamir, Efficient cache attacks on AES, and countermeasures. J. Cryptol 23(1), 37–71 (2010)MathSciNetCrossRef E. Tromer, D. Osvik, A. Shamir, Efficient cache attacks on AES, and countermeasures. J. Cryptol 23(1), 37–71 (2010)MathSciNetCrossRef
38.
go back to reference J Tan, S Jiao, M Chabbi, X Liu, What every scientific programmer should know about compiler optimizations?, in ICS ‘20: Proceedings of the 34th ACM International Conference on Supercomputing, Article No. 42, Pages 1–12 (2020, June), https://doi.org/10.1145/3392717.3392754 J Tan, S Jiao, M Chabbi, X Liu, What every scientific programmer should know about compiler optimizations?, in ICS ‘20: Proceedings of the 34th ACM International Conference on Supercomputing, Article No. 42, Pages 1–12 (2020, June), https://​doi.​org/​10.​1145/​3392717.​3392754
39.
go back to reference P. Kocher, J. Jaffe, B. Jun, Differential power analysis method and apparatus, in U.S. Patent 7,587,044, (2009) P. Kocher, J. Jaffe, B. Jun, Differential power analysis method and apparatus, in U.S. Patent 7,587,044, (2009)
42.
go back to reference J.J. Quisquater, D. Samyde, ElectroMagnetic Analysis (EMA): Measures and counter- measures for smart cards,” in Smart Card Programming and Security (E-smart 2001). Lecture Notes in Computer Science, Vol. 2140, pp. 200−210, (2001) J.J. Quisquater, D. Samyde, ElectroMagnetic Analysis (EMA): Measures and counter- measures for smart cards,” in Smart Card Programming and Security (E-smart 2001). Lecture Notes in Computer Science, Vol. 2140, pp. 200−210, (2001)
43.
go back to reference R. Qiao, M. Seaborn, A new approach for rowhammer attacks,” in Hardware Oriented Security and Trust (HOST), 2016 IEEE International Symposium on Hardware Oriented Security, pp. 161−166, (2016). R. Qiao, M. Seaborn, A new approach for rowhammer attacks,” in Hardware Oriented Security and Trust (HOST), 2016 IEEE International Symposium on Hardware Oriented Security, pp. 161−166, (2016).
44.
go back to reference O. Mutlu, J.S. Kim, RowHammer: A retrospective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39, 1555–1571 (2020)CrossRef O. Mutlu, J.S. Kim, RowHammer: A retrospective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39, 1555–1571 (2020)CrossRef
46.
go back to reference K. Tiri, M. Akmal, I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Solid- State Circuits Conference (ESSCIRC 2002). Proceedings of the 28th European, (2002) K. Tiri, M. Akmal, I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Solid- State Circuits Conference (ESSCIRC 2002). Proceedings of the 28th European, (2002)
47.
go back to reference D. Agrawal, B. Archambeault, J.R. Rao, P. Roha, The EM Side-Channel(s), in Cryptographic Hardware and Embedded Systems (CHES). Lecture Notes in Computer Science, vol. 2523, (2002), pp. 29–45 D. Agrawal, B. Archambeault, J.R. Rao, P. Roha, The EM Side-Channel(s), in Cryptographic Hardware and Embedded Systems (CHES). Lecture Notes in Computer Science, vol. 2523, (2002), pp. 29–45
Metadata
Title
Overcoming Wifi Jamming and other security challenges at the Edge
Authors
Charles J. Gillan
Denis Guilhot
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-74536-3_8