Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
Self-management in chaotic wireless deployments
Proceedings of the 11th annual international conference on Mobile computing and networking
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Performance Enhancement of Multirate IEEE 802.11 WLANs with Geographically Scattered Stations
IEEE Transactions on Mobile Computing
IQU: practical queue-based user association management for WLANs
Proceedings of the 12th annual international conference on Mobile computing and networking
Component based channel assignment in single radio, multi-channel ad hoc networks
Proceedings of the 12th annual international conference on Mobile computing and networking
Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
The need for cross-layer information in access point selection algorithms
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Time-based fairness improves performance in multi-rate WLANs
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
MDG: measurement-driven guidelines for 802.11 WLAN design
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
FatVAP: aggregating AP backhaul capacity to maximize throughput
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
A jamming-resistant MAC protocol for single-hop wireless networks
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Opportunistic use of client repeaters to improve performance of WLANs
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Gaming the jammer: is frequency hopping effective?
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Intelligent jamming in wireless networks with applications to 802.11b and other networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Eliminating the performance anomaly of 802.11b
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.