Spread spectrum communications; vols. 1-3
Spread spectrum communications; vols. 1-3
A rate-adaptive MAC protocol for multi-Hop wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Local Area Networks
Opportunistic media access for multirate ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
IEEE 802.11 rate adaptation: a practical approach
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
Adversarial contention resolution for simple channels
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Robust rate adaptation for 802.11 wireless networks
Proceedings of the 12th annual international conference on Mobile computing and networking
SecNav: secure broadcast localization and time synchronization in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Efficient channel-aware rate adaptation in dynamic environments
Proceedings of the 6th international conference on Mobile systems, applications, and services
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Proceedings of the 6th international conference on Mobile systems, applications, and services
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
A jamming-resistant MAC protocol for single-hop wireless networks
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Proceedings of the 14th ACM international conference on Mobile computing and networking
Zero pre-shared secret key establishment in the presence of jammers
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Cross-layer wireless bit rate adaptation
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Frequency-aware rate adaptation and MAC protocols
Proceedings of the 15th annual international conference on Mobile computing and networking
ARES: an anti-jamming reinforcement system for 802.11 networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
On the capacity of rate-adaptive packetized wireless communication links under jamming
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
Hi-index | 0.00 |
We investigate the resiliency of IEEE802.11 rate adaptation algorithms (RAA) against smart jamming attacks. We consider several classes of state-of-the-art RAAs that include the SampleRate, ONOE, AMRR, and the RAA used in Atheros Microsoft Windows XP driver. We model the behavior of these algorithms, and show the existence of very efficient attacks that exploit RAA-specific vulnerabilities as well as the inherent weaknesses that exist in the design of IEEE802.11 MAC and link layer protocol: in particular the overt packet rate information being transmitted, predictable rate selection mechanism, performance anomaly caused by the equiprobability of transmissions among all nodes regardless of the data rates being employed, and the lack of interference differentiation from poor link quality by IEEE802.11 RAAs. In this work, we present algorithms that determine optimal jamming strategies against RAAs for a given jamming budget, and experimentally demonstrate the efficiency of these smart jamming attacks, which can be orders of magnitude more efficient than naive jamming. For example, in the case of SampleRate, eight reactive jamming pulses every second are sufficient to achieve the same network throughput degradation achieved by a periodic jammer with the jamming energy cost 100 times higher. Some of the RAAs react even worse to smart jamming attacks; ONOE in particular suffers from the phenomenon of congestion collapse where the nodes fail to recover from the lowest data rate even after the jammer stops jamming. At the end, we summarize fundamental reasons behind such RAA vulnerabilities and propose a preliminary set of mitigation techniques. We leave the experimental demonstration of the efficiency of the proposed mitigation mechanisms for future work.