Persistent jamming in wireless local area networks: Attack and defense

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 769
  • Download : 0
Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this paper, we demonstrate that reactive jamming is only effective against channel hopping WLAN devices in non-dense networks and that it is not effective in dense networks. Then, we propose a new jamming attack called “persistent jamming”, which is a modified reactive jamming that is effective in dense networks. The proposed persistent jamming attack can track a device that switches channels using the following two features, and it can attack the specific target or a target group of devices. The first feature is that the proposed attack can use the partial association ID (PAID), which is included for power saving in the IEEE 802.11ac/af/ah frame headers, to track and jam the targets. The second feature is that it is possible to attack persistently based on device fingerprints in IEEE 802.11a/b/g/n legacy devices. Our evaluation results demonstrate that the proposed persistent jamming can improve the attack efficiency by approximately 80% in dense networks compared with the reactive jamming scheme, and it can also shut down the communication link of the target nodes using 20 dBm of jamming power and a 125 ms response time. In order to defend against the persistent jamming attack, this paper proposes three defense mechanisms for anti-tracking and anti-jamming; a digital fingerprints predistortion, dynamic ID allocation, and dual channel friendly jamming. The experimental results demonstrate that the proposed defense mechanisms are feasible and effective to significantly decrease the device tracking success ratio of the persistent jamming attack.
Publisher
ELSEVIER SCIENCE BV
Issue Date
2016-11
Language
English
Article Type
Article
Keywords

ERROR VECTOR MAGNITUDE; PHYSICAL LAYER; AUTHENTICATION

Citation

COMPUTER NETWORKS, v.109, pp.67 - 83

ISSN
1389-1286
DOI
10.1016/j.comnet.2016.06.024
URI
http://hdl.handle.net/10203/214422
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0