Denial of Service in Sensor Networks
Computer
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Jamming for good: a fresh approach to authentic communication in WSNs
Proceedings of the second ACM conference on Wireless network security
Enabling MAC protocol implementations on software-defined radios
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Cross-layer jamming detection and mitigation in wireless broadcast networks
IEEE/ACM Transactions on Networking (TON)
Modern Communications Jamming Principles and Techniques
Modern Communications Jamming Principles and Techniques
WiFire: a firewall for wireless networks
Proceedings of the ACM SIGCOMM 2011 conference
Investigation of signal and message manipulations on the wireless channel
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform
ACM SIGMOBILE Mobile Computing and Communications Review
On the capacity of rate-adaptive packetized wireless communication links under jamming
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Counter-jamming using mixed mechanical and software interference cancellation
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Detection of reactive jamming in DSSS-based wireless networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Perfect contextual information privacy in WSNs undercolluding eavesdroppers
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Defend your home!: jamming unsolicited messages in the smart home
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Experimental analysis of attacks on next generation air traffic communication
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed in the literature, reactive jamming, i.e., targeting only packets that are already on the air, is generally recognized as a stepping stone in implementing optimal jamming strategies. The reason is that, while destroying only selected packets, the adversary minimizes its risk of being detected. One might hope for reactive jamming to be too challenging or uneconomical for an attacker to conceive and implement due to its strict real-time requirements. Yet, in this work we disillusion from such hopes as we demonstrate that flexible and reliable software-defined reactive jamming is feasible by designing and implementing a reactive jammer against IEEE 802.15.4 networks. First, we identify the causes of loss at the physical layer of 802.15.4 and show how to achieve the best performance for reactive jamming. Then, we apply these insights to our USRP2-based reactive jamming prototype, enabling a classification of transmissions in real-time, and reliable and selective jamming. The prototype achieves a reaction time in the order of microseconds, a high precision (such as targeting individual symbols), and a 97.6% jamming rate in realistic indoor scenarios for a single reactive jammer, and over 99.9% for two concurrent jammers.