Skip to main content
Erschienen in: Wireless Networks 6/2011

01.08.2011

A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

verfasst von: Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas

Erschienen in: Wireless Networks | Ausgabe 6/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The CCA (Clear Channel Assessment) threshold specifies the RSSI value below which, receptions are ignored with regards to carrier sensing [10].
 
2
The rate scaling overhead accounts for the higher delays incurred due to transient lower rates that the rate adaptation algorithm invokes.
 
3
For larger packet sizes, objective 1 cannot be satisfied; hence we do not need to consider such a case.
 
4
We consider TCP-Reno in this set of experiments.
 
Literatur
3.
Zurück zum Zitat Sundaresan, K., & Papagiannaki, K. (2006). The need for cross-layer information in access point selection algorithms. In ACM IMC. Sundaresan, K., & Papagiannaki, K. (2006). The need for cross-layer information in access point selection algorithms. In ACM IMC.
4.
Zurück zum Zitat Heusse, M., Rousseau, F., Berger-Sabbatel, G., & Duda, A. (2003). Performance anomaly of 802.11b. In IEEE INFOCOM. Heusse, M., Rousseau, F., Berger-Sabbatel, G., & Duda, A. (2003). Performance anomaly of 802.11b. In IEEE INFOCOM.
5.
Zurück zum Zitat Athanasiou, G., Korakis, T., Ercetin, O., & Tassiulas, L. (2007). Dynamic cross-layer association in 802.11-based mesh networks. In IEEE INFOCOM. Athanasiou, G., Korakis, T., Ercetin, O., & Tassiulas, L. (2007). Dynamic cross-layer association in 802.11-based mesh networks. In IEEE INFOCOM.
8.
Zurück zum Zitat Kauffmann, B., et al. (2007). Measurement-based self organization of interfering 802.11 wireless access networks. In IEEE INFOCOM. Kauffmann, B., et al. (2007). Measurement-based self organization of interfering 802.11 wireless access networks. In IEEE INFOCOM.
9.
Zurück zum Zitat Broustis, I., Papagiannaki, K., Krishnamurthy, S. V., Faloutsos, M., & Mhatre, V. (2007). MDG: Measurement-driven guidelines for 802.11 WLAN design. In ACM MOBICOM. Broustis, I., Papagiannaki, K., Krishnamurthy, S. V., Faloutsos, M., & Mhatre, V. (2007). MDG: Measurement-driven guidelines for 802.11 WLAN design. In ACM MOBICOM.
10.
Zurück zum Zitat Mhatre, V., Papagiannaki, K., & Baccelli, F. (2007). Interference mitigation through power control in high density 802.11 WLANs. In IEEE INFOCOM. Mhatre, V., Papagiannaki, K., & Baccelli, F. (2007). Interference mitigation through power control in high density 802.11 WLANs. In IEEE INFOCOM.
11.
Zurück zum Zitat Razafindralambo, T., Lassous, I. G., Iannone, L., & Fdida, S. (2006). Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks. In ACM MSWiM. Razafindralambo, T., Lassous, I. G., Iannone, L., & Fdida, S. (2006). Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks. In ACM MSWiM.
12.
Zurück zum Zitat ANSI/IEEE 802.11-Standard. 1999 edition. ANSI/IEEE 802.11-Standard. 1999 edition.
14.
Zurück zum Zitat Bellavista, P., Corradi, A., & Foschini, L. (2007). The MUM middleware to counteract IEEE 802.11 performance anomaly in context-aware multimedia provisioning. International Journal of Multimedia and Ubiquitous Engineering, 2(2), 15–33. http://middleware.unibo.it/node/545 Bellavista, P., Corradi, A., & Foschini, L. (2007). The MUM middleware to counteract IEEE 802.11 performance anomaly in context-aware multimedia provisioning. International Journal of Multimedia and Ubiquitous Engineering, 2(2), 15–33. http://​middleware.​unibo.​it/​node/​545
16.
Zurück zum Zitat Vlavianos, A., Law, E., Broustis, I., Krishnamurthy, S. V., & Faloutsos, M. (2008). Assessing link quality in IEEE 802.11 wireless networks: Which is the right metric? In IEEE PIMRC. Vlavianos, A., Law, E., Broustis, I., Krishnamurthy, S. V., & Faloutsos, M. (2008). Assessing link quality in IEEE 802.11 wireless networks: Which is the right metric? In IEEE PIMRC.
17.
Zurück zum Zitat Dunn, J., Neufeld, M., Sheth, A., Grunwald, D., & Bennett, J. (2004). A practical cross-layer mechanism for fairness in 802.11 networks. In IEEE BROADNETS. Dunn, J., Neufeld, M., Sheth, A., Grunwald, D., & Bennett, J. (2004). A practical cross-layer mechanism for fairness in 802.11 networks. In IEEE BROADNETS.
18.
Zurück zum Zitat Portoles, M., Zhong, Z., & Choi, S. (2003). IEEE 802.11 downlink traffic shaping scheme for multi-user service. In IEEE PIMRC. Portoles, M., Zhong, Z., & Choi, S. (2003). IEEE 802.11 downlink traffic shaping scheme for multi-user service. In IEEE PIMRC.
19.
Zurück zum Zitat Iannone, L., & Fdida, S. (2005). Sdt. 11b: Un Schema a Division de Temps Pour Eviter l’anomalie de la Couche MAC 802.11b. In CFIP. Iannone, L., & Fdida, S. (2005). Sdt. 11b: Un Schema a Division de Temps Pour Eviter l’anomalie de la Couche MAC 802.11b. In CFIP.
20.
Zurück zum Zitat Yoo, S., Choi, J., Hwang, J.-H., & Yoo, C. (2005). Eliminating the performance anomaly of 802.11b. In ICN. Yoo, S., Choi, J., Hwang, J.-H., & Yoo, C. (2005). Eliminating the performance anomaly of 802.11b. In ICN.
22.
Zurück zum Zitat Tan, G., & Guttag, J. (2004) Time-based fairness improves performance in multi-rate WLANs. In ACM USENIX. Tan, G., & Guttag, J. (2004) Time-based fairness improves performance in multi-rate WLANs. In ACM USENIX.
23.
Zurück zum Zitat Guo, L., Ding, X., Wang, H., Li, Q., Chen, S., & Zhang, X. (2006). Exploiting idle communication power to improve wireless network performance and energy efficiency. In IEEE INFOCOM. Guo, L., Ding, X., Wang, H., Li, Q., Chen, S., & Zhang, X. (2006). Exploiting idle communication power to improve wireless network performance and energy efficiency. In IEEE INFOCOM.
24.
Zurück zum Zitat Bahl, V., Chandra, R., Lee, P. P. C., Misra, V., Padhye, J., Rubenstein, D., & Yu, Y. (2008). Opportunistic use of client repeaters to improve performance of WLANs. In ACM CONEXT. Bahl, V., Chandra, R., Lee, P. P. C., Misra, V., Padhye, J., Rubenstein, D., & Yu, Y. (2008). Opportunistic use of client repeaters to improve performance of WLANs. In ACM CONEXT.
25.
Zurück zum Zitat Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In ACM MOBIHOC. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In ACM MOBIHOC.
26.
Zurück zum Zitat Gummadi, R., et al. (2007). Understanding and mitigating the impact of RF interference on 802.11 networks. In ACM SIGCOMM. Gummadi, R., et al. (2007). Understanding and mitigating the impact of RF interference on 802.11 networks. In ACM SIGCOMM.
27.
Zurück zum Zitat Navda, V., et al. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE INFOCOM mini-conference. Navda, V., et al. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE INFOCOM mini-conference.
28.
Zurück zum Zitat Hu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In WISE. Hu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In WISE.
31.
Zurück zum Zitat Pelechrinis, K., Koufogiannakis, C., & Krisnamurthy, S. V. (2009). Gaming the jammer: Is frequency hopping effective? In WiOpt. Pelechrinis, K., Koufogiannakis, C., & Krisnamurthy, S. V. (2009). Gaming the jammer: Is frequency hopping effective? In WiOpt.
32.
Zurück zum Zitat Vedantham, R., Kakumanu, S., Lakshmanan, S., & Sivakumar, R. (2006). Component based channel assignment in single radio, multi-channel ad hoc networks. In ACM MOBICOM Vedantham, R., Kakumanu, S., Lakshmanan, S., & Sivakumar, R. (2006). Component based channel assignment in single radio, multi-channel ad hoc networks. In ACM MOBICOM
33.
Zurück zum Zitat Kandula, S., Lin, K.C-J., Badirkhanli, T., & Katabi, D. (2008). FatVAP: Aggregating AP backhaul capacity to maximize throughput. In USENIX NSDI. Kandula, S., Lin, K.C-J., Badirkhanli, T., & Katabi, D. (2008). FatVAP: Aggregating AP backhaul capacity to maximize throughput. In USENIX NSDI.
34.
Zurück zum Zitat Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attacks and defense strategies. In IEEE Network. Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attacks and defense strategies. In IEEE Network.
36.
Zurück zum Zitat Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. In ACM MOBIHOC (poster). Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. In ACM MOBIHOC (poster).
37.
Zurück zum Zitat Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In ACM WiSec. Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In ACM WiSec.
38.
Zurück zum Zitat Noubir, G. (2004). On connectivity in ad hoc network under jamming using directional antennas and mobility. Wired/Wireless Internet Communications, 2957/2004, 186–200.CrossRef Noubir, G. (2004). On connectivity in ad hoc network under jamming using directional antennas and mobility. Wired/Wireless Internet Communications, 2957/2004, 186–200.CrossRef
39.
Zurück zum Zitat Li, M., Koutsopoulos, I., & Poovendran, R. (2007). Optimal jamming attacks and network defense policies in wireless sensor networks. In IEEE INFOCOM. Li, M., Koutsopoulos, I., & Poovendran, R. (2007). Optimal jamming attacks and network defense policies in wireless sensor networks. In IEEE INFOCOM.
40.
Zurück zum Zitat Cagalj, M., Capkun, S., & Hubaux, J.-P. (2007). Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1), 100–114.CrossRef Cagalj, M., Capkun, S., & Hubaux, J.-P. (2007). Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1), 100–114.CrossRef
41.
Zurück zum Zitat Law, Y. W., van Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2005). Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Proceedings of ACM security sensor ad-hoc networks (SASN). Law, Y. W., van Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2005). Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Proceedings of ACM security sensor ad-hoc networks (SASN).
42.
Zurück zum Zitat Mallik, R., Scholtz, R., Papavassilopoulos, G. (2000). Analysis of an on-off jamming situation as a dynamic game. IEEE Transactions on Communications, 48(8), 1360–1373.CrossRef Mallik, R., Scholtz, R., Papavassilopoulos, G. (2000). Analysis of an on-off jamming situation as a dynamic game. IEEE Transactions on Communications, 48(8), 1360–1373.CrossRef
43.
Zurück zum Zitat Awerbuch, B., et al. (2008). A jamming-resistant MAC protocol for single-hop wireless networks. In PODC. Awerbuch, B., et al. (2008). A jamming-resistant MAC protocol for single-hop wireless networks. In PODC.
44.
Zurück zum Zitat Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In IEEE SECON. Wood, A. D., Stankovic, J. A., & Zhou, G. (2007). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In IEEE SECON.
45.
Zurück zum Zitat Acharya, M., Shamra, T., Thuente, D., & Sizemore, D. (2005). Intelligent jamming attacks in 802.11b wireless networks. In OPNETWORK conference. Acharya, M., Shamra, T., Thuente, D., & Sizemore, D. (2005). Intelligent jamming attacks in 802.11b wireless networks. In OPNETWORK conference.
46.
Zurück zum Zitat Thuente, D., & Acharya, M. (2006). Intelligent jamming in wireless networks with applications to 802.11b and other networks. In MILCOM. Thuente, D., & Acharya, M. (2006). Intelligent jamming in wireless networks with applications to 802.11b and other networks. In MILCOM.
49.
Zurück zum Zitat Jardosh, A., et al. (2006). IQU: Practical Queue-Based User Association. In ACM MOBICOM. Jardosh, A., et al. (2006). IQU: Practical Queue-Based User Association. In ACM MOBICOM.
50.
Zurück zum Zitat Akella, A., Judd, G., Seshan, S., & Steenkiste, P. (2005). Self-management in chaotic wireless deployments. In ACM MOBICOM. Akella, A., Judd, G., Seshan, S., & Steenkiste, P. (2005). Self-management in chaotic wireless deployments. In ACM MOBICOM.
Metadaten
Titel
A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks
verfasst von
Ioannis Broustis
Konstantinos Pelechrinis
Dimitris Syrivelis
Srikanth V. Krishnamurthy
Leandros Tassiulas
Publikationsdatum
01.08.2011
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2011
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-011-0363-6

Weitere Artikel der Ausgabe 6/2011

Wireless Networks 6/2011 Zur Ausgabe