Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Partially overlapped channels not considered harmful
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Component based channel assignment in single radio, multi-channel ad hoc networks
Proceedings of the 12th annual international conference on Mobile computing and networking
MobiSteer: using steerable beam directional antenna for vehicular network access
Proceedings of the 5th international conference on Mobile systems, applications and services
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Design and deployment considerations for high performance MIMO testbeds
Proceedings of the 4th Annual International Conference on Wireless Internet
Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Space-Time Coding: Theory and Practice
Space-Time Coding: Theory and Practice
Hi-index | 0.01 |
Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both experimentation and analysis. Briefly, the limitations of FH are: (a) the energy spill over between adjacent channels that are considered to be orthogonal, and (b) the small number of available orthogonal bands. In a nutshell, the main contributions of our work are: (a) Construction of a measurement-driven game theoretic framework which models the interactions between a jammer and a communication link employing FH. Our model accounts for the above limiting factors and provides bounds on the performance of proactive FH in coping with jamming. (b) Extensive experimentation to quantify the impact of a jammer on 802.11a/g/n networks. Interestingly, we find that 802.11n devices can be more vulnerable to jamming as compared with legacy devices. We carefully analyze the reasons behind this observation. (c) Application of our framework to quantify the efficacy of proactive FH and validation of our analytical bounds across various 802.11 network configurations. (d) Formal derivation of the optimal strategies for both the link and the jammer in 802.11 networks. Our results demonstrate that FH seems to be inadequate in coping with jamming attacks in current 802.11 networks.