Documente Academic
Documente Profesional
Documente Cultură
rabat@ittc.ku.edu
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Outline
Feasibility of Launching & Detecting Jamming
Attacks in Wireless Networks
Adaptive Radio Channel Allocation for
Supporting Coexistence of 802.15.4 & 802.11b
Defending Against Jamming Attacks in Wireless
Local Area Networks
References
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Outline
Feasibility of Launching & Detecting Jamming
Attacks in Wireless Networks
Adaptive Radio Channel Allocation for
Supporting Coexistence of 802.15.4 & 802.11b
Defending Against Jamming Attacks in
Wireless Local Area Networks
References
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Definitions and Characteristics
A jammer is an entity who is purposefully trying to interfere
with the physical transmission and reception of wireless
communications
A jammer continuously emits RF signals to fill a wireless
channel so that legitimate traffic will be completely blocked
Common characteristics for all jamming attacks is that
their communications are not compliant with MAC protocols
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Packet Send Ratio
The ratio of packets that are successfully sent out by
a legitimate traffic source compared to the number
of packets it intends to send out at the MAC layer
Reason
Channel busy
Transmission delayed
New packets dropped when buffer space is full
Packets that are too long in the buffer, timeout
N packets to send; M sent successfully
PSR = M/N
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Packet Delivery Ratio
The ratio of packets that are successfully delivered to
a destination compared to the number of packets
that have been sent out by the sender
Reason
Destination may not be able to decode a received
packet due to interference
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Jamming Attack Models
Constant Jammer
Deceptive Jammer
Random Jammer
Reactive Jammer
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Constant Jammer
14 August 2008
Jamming Attacks
ITTC
Jamming Attacks
Wireless Networks
Deceptive Jammer
Constantly injects regular packets to the channel
Normal nodes will be deceived by the packets
Normal nodes just check the preamble and remain
silent
Jammer can only send out preambles
14 August 2008
Jamming Attacks
10
ITTC
Jamming Attacks
Wireless Networks
Random Jammer
Alternates between sleeping and jamming
After jamming for tj units of time, it turns off its radio
and enters sleeping mode
After sleeping for ts units of time, it wakes up and
resumes jamming (constant or deceptive)
tj and ts may be random or fixed intervals-energy
conservation
14 August 2008
Jamming Attacks
11
ITTC
Jamming Attacks
Wireless Networks
Reactive Jammer
Jammer stays quiet when the channel is idle
Jammer starts transmitting a radio signal as soon as
it senses activity on the channel
Does not conserve energy because the jammers
radio must be continuously on in order to sense the
channel
However, it is harder to detect
14 August 2008
Jamming Attacks
12
ITTC
Jamming Attacks
Wireless Networks
Level of Interference
Distance between jammer and nodes
Relative transmission power of the jammer and
nodes
MAC protocol employed by the nodes
14 August 2008
Jamming Attacks
13
ITTC
Jamming Attacks
Wireless Networks
Detecting Jamming Attacks
Signal Strength
Carrier Sensing Time
Packet Delivery Ratio
14 August 2008
Jamming Attacks
14
ITTC
Jamming Attacks
Outline
Feasibility of Launching & Detecting Jamming
Attacks in Wireless Networks
Adaptive Radio Channel Allocation for
Supporting Coexistence of 802.15.4 & 802.11b
Defending Against Jamming Attacks in
Wireless Local Area Networks
References
14 August 2008
Jamming Attacks
15
ITTC
Solution
Multiple radio channels for the coexistence of
802.15.4 LR WPAN and 802.11b WLAN
14 August 2008
Jamming Attacks
16
ITTC
Jamming Attacks
17
ITTC
14 August 2008
Jamming Attacks
18
ITTC
14 August 2008
Jamming Attacks
19
ITTC
14 August 2008
Jamming Attacks
20
ITTC
Advantage
Small overhead for switching channels
Same routing path used
14 August 2008
Jamming Attacks
21
ITTC
Jamming Attacks
22
ITTC
14 August 2008
Jamming Attacks
23
ITTC
14 August 2008
Jamming Attacks
24
ITTC
14 August 2008
Jamming Attacks
25
ITTC
14 August 2008
Jamming Attacks
26
ITTC
14 August 2008
Jamming Attacks
27
ITTC
14 August 2008
Jamming Attacks
28
ITTC
14 August 2008
Jamming Attacks
29
ITTC
14 August 2008
Jamming Attacks
30
ITTC
Jamming Attacks
31
ITTC
Jamming Attacks
Outline
Feasibility of Launching & Detecting Jamming
Attacks in Wireless Networks
Adaptive Radio Channel Allocation for
Supporting Coexistence of 802.15.4 & 802.11b
Defending Against Jamming Attacks in
Wireless Local Area Networks
References
14 August 2008
Jamming Attacks
32
ITTC
Solution
Cumulative-Sum-based (CUSUM) Detection Method
14 August 2008
Jamming Attacks
33
ITTC
Jamming Attacks
34
ITTC
14 August 2008
Jamming Attacks
35
ITTC
Jamming Attacks
36
ITTC
14 August 2008
Jamming Attacks
37
ITTC
Jamming Attacks
38
ITTC
14 August 2008
Jamming Attacks
39
ITTC
Jamming Attacks
40
ITTC
14 August 2008
Jamming Attacks
41
ITTC
14 August 2008
Jamming Attacks
42
ITTC
Jamming Attacks
Outline
Feasibility of Launching & Detecting Jamming
Attacks in Wireless Networks
Adaptive Radio Channel Allocation for
Supporting Coexistence of 802.15.4 & 802.11b
Defending Against Jamming Attacks in
Wireless Local Area Networks
References
14 August 2008
Jamming Attacks
43
ITTC
Jamming Attacks
References
http://www.winlab.rutgers.edu/~trappe/Papers/
JamDetect_Mobihoc.pdf
http://ieeexplore.ieee.org/iel5/10422/33099/01
559004.pdf?arnumber=1559004
http://www.springerlink.com/content/l2qp0215r
1268p4t/fulltext.pdf
14 August 2008
Jamming Attacks
44