Abstract
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on a large-scale indoor testbed, under different traffic scenarios, network densities and jammer locations. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.
This work was done partially with support from the US Army Research Office under the Multi-University Research Initiative (MURI) grants W911NF-07-1-0318 and the NSF NeTS:WN / Cyber trust grant 0721941.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
SESP jammers, http://www.sesp.com/
ISM wideband jammers. http://69.6.206.229/e-commerce-solutions-catalog1.0.4.html
Sundaresan, K., Papagiannaki, K.: The Need for Cross-Layer Information in Access Point Selection Algorithms. In: ACM IMC (2006)
Heusse, M., Rousseau, F., Berger-Sabbatel, G., Duda, A.: Performance Anomaly of 802.11b. In: IEEE INFOCOM (2003)
Click web page, http://read.cs.ucla.edu/click/
Kauffmann, B., et al.: Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks. In: IEEE INFOCOM (2007)
Broustis, I., Papagiannaki, K., Krishnamurthy, S.V., Faloutsos, M., Mhatre, V.: MDG: Measurement-Driven Guidelines for 802.11 WLAN Design. In: ACM MOBICOM (2007)
Mhatre, V., Papagiannaki, K., Baccelli, F.: Interference Mitigation through Power Control in High Density 802.11 WLANs. In: IEEE INFOCOM (2007)
Razafindralambo, T., Lassous, I.G., Iannone, L., Fdida, S.: Dynamic Packet Aggregation to Solve Performance Anomaly in 802.11 Wireless Networks. In: ACM MSWiM (October 2006)
ANSI/IEEE 802.11-Standard. 1999 edn.
Kim, H., Yun, S., Kang, I., Bahk, S.: Resolving 802.11 Performance Anomalies through QoS Differentiation. IEEE Comm. Letters 9(7) (July 2005)
Bellavista, P., Corradi, A., Foschini, L.: The MUM Middleware to Counteract IEEE 802.11 Performance Anomaly in Context-aware Multimedia Provisioning. International Journal of Multimedia and Ubiquitous Engineering 2(2) (July 2007)
Hierarchical Token Bucket, http://luxik.cdi.cz/~devik/qos/htb/
Vlavianos, A., Law, E., Broustis, I., Krishnamurthy, S.V., Faloutsos, M.: Assessing Link Quality in IEEE 802.11 Wireless Networks: Which is the Right Metric? In: IEEE PIMRC (2008)
Dunn, J., Neufeld, M., Sheth, A., Grunwald, D., Bennett, J.: A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks. In: IEEE BROADNETS (2004)
Portoles, M., Zhong, Z., Choi, S.: IEEE 802.11 Downlink Traffic Shaping Scheme for Multi-User Service. In: IEEE PIMRC (2003)
Iannone, L., Fdida, S.: Sdt. 11b: Un Schema a Division de Temps Pour Eviter l’anomalie de la Couche MAC 802.11b. In: CFIP (April 2005)
Yoo, S., Choi, J., Hwang, J.-H., Yoo, C.: Eliminating the Performance Anomaly of 802.11b. In: ICN (2005)
Yang, D., et al.: Performance Enhancement of Multi-Rate IEEE 802.11 WLANs with Geographically-Scattered Stations. IEEE Trans. Mob. Comp. 5(7) (July 2006)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: ACM MOBIHOC (2005)
Gummadi, R., et al.: Understanding and Mitigating the Impact of RF Interference on 802.11 Networks. In: ACM SIGCOMM (2007)
Navda, V., et al.: Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks. In: IEEE INFOCOM mini-conference (2007)
Hu, W., Wood, T., Trappe, W., Zhang, Y.: Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service. In: WISE (2004)
Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming Sensor Networks: Attacks and Defense Strategies. In: IEEE Network (May/June 2006)
Lin, G., Noubir, G.: On Link Layer Denial of Service in Data Wireless LANs. In: Wireless Communications and Mobile Computing (May 2003)
Noubir, G., Lin, G.: Low-power DoS Attacks in Data Wireless LANs and Countermeasures. In: ACM MOBIHOC (2003) (poster)
Noubir, G.: On Connectivity in Ad Hoc Network under Jamming Using Directional Antennas and Mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 186–200. Springer, Heidelberg (2004)
Rude/Crude measurement tool, http://rude.sourceforge.net/
Soekris-net4826, http://www.soekris.com/net4826.htm
Jardosh, A., et al.: IQU: Practical Queue-Based User Association. In: ACM MOBICOM (2006)
Akella, A., Judd, G., Seshan, S., Steenkiste, P.: Self-Management in Chaotic Wireless Deployments. In: ACM MOBICOM (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L. (2009). FIJI: Fighting Implicit Jamming in 802.11 WLANs. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 19. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05284-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-05284-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05283-5
Online ISBN: 978-3-642-05284-2
eBook Packages: Computer ScienceComputer Science (R0)