DK presents Division of Computer Science, KAIST

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Securing Future Wireless Networks: Challenges and Strategies Pandurang Kamat Wade Trappe.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Resilience To Jamming Attacks
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
1 Jamming in Wireless Sensor Networks Ertan Onur December 13 th, 2006 Boğaziçi University.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University Network/Computer Security.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
ARES: an Anti-jamming REinforcement System for Networks Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
MAC Protocols for Sensor Networks
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Wireless Sensor Networks 4. Medium Access
Net301 lecture9 11/5/2015 Lect 9 NET301.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Goal Control the amount of traffic in the network
basics Richard Dunn CSE July 2, 2003.
The Medium Access Control Sublayer
Understanding the Real-World Performance of Carrier Sense
Wireless LAN Simulation IEEE MAC Protocol
Protocols.
Cross-layer Analysis for detecting Wireless Misbehavior
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Protocols.
Presentation transcript:

DK presents Division of Computer Science, KAIST The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood MobiHoc 2005 DK presents Division of Computer Science, KAIST CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Jamming Attack Jammer? (/-_-)/ ~!@#$#$% Alice Bob Jammer X An entity who is purposefully trying to interfere with the physical transmission and reception of wireless communications. How are you? (/-_-)/ ~!@#$#$% Alice I am fine, thank you. Bob Jammer X continuously emit a signal on the channel. Jammer prevents a real traffic source from sending out a packet, And prevents the reception of legitimate packets. CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Outline Motivation: MAC-layer weaknesses in 802.11 Is it feasible? [2] Australian CERT, AA-2004.02 - “Denial of service vulnerability in IEEE 802.11 devices.” Is it feasible? Jamming metrics: (1) packet send, (2) delivery ratio Jamming attack models Detecting jamming attacks Basic statistics Jamming detection with consistency checks Concluding remarks CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Jamming Metrics PSR, packet send ratio PDR, packet delivery ratio m only m of them go through = = n Intends to send out n messages Never senses the channel as idle drop ~ buffer full drop ~ timeout MAC buffer 0, if no packets are received. = Number of packets pass the CRC check Number of packets received CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Jamming Attack Models Constant jammer Deceptive jammer Random jammer Continually sends out random bits without following any MAC etiquette. Deceptive jammer Send a continuous stream of preamble bits (0xAA in Tiny OS.) Random jammer After jamming for tj time, enters a “sleeping” mode for ts time. Reactive jammer Stays quiet, starts jamming as soon as it senses activity on the channel. Alice Jammer Berkeley MICA2 Mote platform Bob CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

PSR and PDR Results PSR and PDR Results (%) for different jammer models. Distance (inch) BMAC SenSys2004 1.1.1 MAC PSR PDR 38.6 74.37 0.43 1.00 1.94 Constant Jammer Distance (inch) BMAC 1.1.1 MAC PSR PDR 38.6 0.00 Deceptive Jammer Distance (inch) BMAC 1.1.1 MAC PSR PDR 38.6 99.00 0.00 100.00 Reactive Jammer CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

∴ PSR and PDR Results Jamming is effective So then, how to detect? CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Basic Statistics for Detecting Jam (1) Received signal strength CBR 5.28kbps Normal scenario MaxTraffic 6.46kbps Constant Jammer dBm Deceptive Jammer Jammer In an IEEE 802.11 system RSSI is the received signal strength in a wireless environment, in arbitrary units. RSSI can be used internally in a wireless networking card to determine when the amount of radio energy in the channel is below a certain threshold at which point the network card is clear to send (CTS). Once the card is clear to send, a packet of information can be sent. The end-user will likely observe an RSSI value when measuring the signal strength of a wireless network through the use of a wireless network monitoring tool like Network Stumbler. Reactive Jammer Random Jammer CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Basic Statistics for Detecting Jam (2) Signal strength spectral discrimination [15] Time Series Analysis by High order crossings (HOC) Cosntant and Deceptive Jammer Normal, Reactive, and Random Jammer D2 D2 Normal scenario D1 D1 CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Basic Statistics for Detecting Jam (3) Carrier sensing time Keep track of time it spends waiting for the channel to become idle. Cumulative Distribution of Carrier Sensing Time MaxTraffic Constant and Deceptive Jammer MaxTraffic Reactive and Random Jammer Sensing Time (ms) Sensing Time (ms) CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Basic Statistics for Detecting Jam (4) Packet delivery ratio (PDR) PDR can be used to differentiate jamming from congestion: Under network congestion, PDR is still around 78%. PDR is not effective for other network dynamics: sender battery failure, or sender moving out of the receiver’s communication range. 0, if no packets are received. = Number of packets pass the CRC check Number of packets received CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Basic Statistics for Detecting Jam ∴ Statistics built upon individual measurements may lead to false conclusions. CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

PDR with Consistency Check – (1) PDR with “signal strength consistency” check Observed PDR Observed signal strength Typical Scenarios 0 or Low Low neighbor failure or absence High node jammed Jammed region (PDR, SS) above the 99% SS confidence intervals. SS (dBm) Conduct a simple regression to build a relationship (PDR, SS) PDR % CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

PDR with Consistency Check – (2) PDR with location consistency check Requires the support of GPS [7] or other localization techniques. [3, 19] Let every node periodically advertise its current location, and keep track of both the PDR and the location of neighbors. Jammed region (PDR, d) neighbor is in short distance, but corresponding PDR is low. Distance (inch) PDR % CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Concluding Remarks Shared nature of wireless medium allows non-cryptographic security threats likes “radio interference attacks” Shows effectiveness of four jamming strategies using PSR and PDR Detecting the presence of jamming attacks PDR and Signal strength consistency checks and Location consistency checks. CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)

Thank You! Any question? For more discussion: DK, Rm4423, dklee@an.kaist.ac.kr CS710 (Fall, 2006) -- DK (dklee@an.kaist.ac.kr)