Resilience To Jamming Attacks

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Investigating Mac Power Consumption in Wireless Sensor Network
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Planning and Analyzing Wireless LAN
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
WLAN.
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
Goal Control the amount of traffic in the network
Wireless LAN Simulation IEEE MAC Protocol
Investigating Mac Power Consumption in Wireless Sensor Network
DK presents Division of Computer Science, KAIST
Presentation transcript:

Resilience To Jamming Attacks SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science rabat@ittc.ku.edu 24 July 2008 Jamming Attacks 1

Jamming Attacks Outline SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Jamming Attacks Outline Feasibility of Launching & Detecting Jamming Attacks in Wireless Networks Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 & 802.11b Defending Against Jamming Attacks in Wireless Local Area Networks References 24 July 2008 Jamming Attacks 2

Jamming Attacks Outline SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Jamming Attacks Outline Feasibility of Launching & Detecting Jamming Attacks in Wireless Networks Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 & 802.11b Defending Against Jamming Attacks in Wireless Local Area Networks References 24 July 2008 Jamming Attacks 3

Jamming Attacks Wireless Networks Definitions and Characteristics A jammer is an entity who is purposefully trying to interfere with the physical transmission and reception of wireless communications A jammer continuously emits RF signals to fill a wireless channel so that legitimate traffic will be completely blocked Common characteristics for all jamming attacks is that their communications are not compliant with MAC protocols 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Packet Send Ratio The ratio of packets that are successfully sent out by a legitimate traffic source compared to the number of packets it intends to send out at the MAC layer Reason Channel busy Transmission delayed New packets dropped when buffer space is full Packets that are too long in the buffer, timeout N packets to send; M sent successfully PSR = M/N 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Packet Delivery Ratio The ratio of packets that are successfully delivered to a destination compared to the number of packets that have been sent out by the sender Reason Destination may not be able to decode a received packet due to interference 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Jamming Attack Models Constant Jammer Deceptive Jammer Random Jammer Reactive Jammer 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Constant Jammer Continuously emits a radio signal Sends out random bits to the channel Does not follow any MAC layer etiquette Does not wait for the channel to become idle 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Deceptive Jammer Constantly injects regular packets to the channel Normal nodes will be deceived by the packets Normal nodes just check the preamble and remain silent Hence jammer can only send out preambles 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Random Jammer Alternates between sleeping and jamming After jamming for tj units of time, it turns off its radio and enters the sleeping mode After sleeping for ts units of time it will wake up and resume jamming tj and ts may be random or fixed intervals taking energy conservation into consideration During wake up phase it can behave as a constant or a deceptive jammer 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Reactive Jammer Not necessary to block the channel when nobody is communicating Jammer stays quiet when the channel is idle Jammer starts transmitting a radio signal as soon as it senses activity on the channel Does not conserve energy because the jammer’s radio must be continuously on in order to sense the channel However, it is harder to detect 24 July 2008 Jamming Attacks

Jamming Attacks Wireless Networks Detecting Jamming Attacks Signal Strength Carrier Sensing Time Packet Delivery Ratio 24 July 2008 Jamming Attacks 13

Jamming Attacks Outline SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Jamming Attacks Outline Feasibility of Launching & Detecting Jamming Attacks in Wireless Networks Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 & 802.11b Defending Against Jamming Attacks in Wireless Local Area Networks References 24 July 2008 Jamming Attacks 14 14

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Ability of one system to perform a task in a given shared environment where other systems may or may not be using the same set of rules. Solution Multiple radio channels for the coexistence of 802.15.4 LR WPAN and 802.11b WLAN 24 July 2008 Jamming Attacks 15

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 802.11b has a radio transmission range of 100m 802.15.4 has a radio transmission range of 10m 802.11b gives radio interference to 802.15.4 system in a large area and from a long distance Performance degradation of 802.15.4 caused by the interference from 802.11b by 92% (a study shows) 24 July 2008 Jamming Attacks 16

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 24 July 2008 Jamming Attacks 17

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Rabat Anam Mahmood SomethingRabat Anam Mahmood 9 October 2007 Radio Channel Allocation Coexistence of 802.15.4 and 802.11b IEEE 802.11b has 11 channels Each channel has a frequency range of 22 MHz IEEE 802.15.4 has 16 channels Each channel is 5 MHz apart Each channel has a frequency range of 3 MHz Frequencies of each 802.11 channel overlaps with frequency ranges for four different 802.15.4 channels Channels 25 & 26 can be used where frequent interference of 802.11b is expected 24 July 2008 Jamming Attacks 18

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 24 July 2008 Jamming Attacks 19

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Interference Detection Clear channel assessment or energy detection provided as RSSI (Received Signal Strength Indicator) services in 802.15.4. RSSI services called periodically or on demand when a sudden degradation of user throughput below a threshold is detected If RSSI confirms that the energy level on a current channel is above the threshold, channel interference is recognized 24 July 2008 Jamming Attacks 20

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Group Formation Nodes under the effect of interference start broadcasting Group Formation messages to the immediate neighbors Due to interference nodes may or may not receive GF message Nodes in a group change the current radio channel to a new one from the switching table. Border nodes provide channel conversion for the group. 24 July 2008 Jamming Attacks 21

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Tear Down Nodes in a group periodically check if the previous channel is clear of interference. If so, a tear down message is sent to all the nodes in a group and the group is torn down. 24 July 2008 Jamming Attacks 22

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Interference size represents the number of nodes in interference Success rate is percentage value relative to without interference 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b The percentage value is the delay increase relative to the delay without interference Since packets are routed through the interference area, the delay is not increased much 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Comparison between packet delays of AODV and AODV plus (adaptive scheme) Due to adaptive scheme, lower packet delay is attained 24 July 2008 Jamming Attacks

Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Rabat Anam Mahmood SomethingRabat Anam Mahmood 9 October 2007 Radio Channel Allocation Coexistence of 802.15.4 and 802.11b Conclusion Performance degradation by interference is mainly caused from changing routing path. The overhead for switching radio channels is very small Hence, by employing the adaptive scheme, routing does not need to find a new path when it hits into an interference area. 24 July 2008 Jamming Attacks 29

Jamming Attacks Outline SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Jamming Attacks Outline Feasibility of Launching & Detecting Jamming Attacks in Wireless Networks Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 & 802.11b Defending Against Jamming Attacks in Wireless Local Area Networks References 24 July 2008 Jamming Attacks 30 30

Defend Against Jamming Attacks Wireless Local Area Networks Rabat Anam Mahmood SomethingRabat Anam Mahmood 9 October 2007 Defend Against Jamming Attacks Wireless Local Area Networks Wireless Jamming Attacks RTS Jamming CTS Jamming Solution Cumulative-Sum-based (CUSUM) Detection Method 24 July 2008 Jamming Attacks 31

Defend Against Jamming Attacks Wireless Local Area Networks RTS Jamming Jammer occupies channel by continuously sending RTS frames with large NAV to access point (AP) AP replies with CTS which can be heard by nearby nodes Neighbor nodes will keep silent for a period of time indicated by NAV Neighbor nodes can hardly occupy the channel to communicate with the AP 24 July 2008 Jamming Attacks 32

Defend Against Jamming Attacks Wireless Local Area Networks 24 July 2008 Jamming Attacks

Defend Against Jamming Attacks Wireless Local Area Networks CTS Jamming Jammer sends CTS frames with spoofed ID which is as same as AP Jammer keeps AP unaware of this behavior by either using directional antenna or remaining far away from the AP Neighbor nodes will assume AP is busy receiving data from a hidden node and will remain silent Neighbor nodes will never get a chance to occupy the channel 24 July 2008 Jamming Attacks 34

Defend Against Jamming Attacks Wireless Local Area Networks 24 July 2008 Jamming Attacks 35

Defend Against Jamming Attacks Wireless Local Area Networks Defending against RTS/CTS attacks Two separate data windows for RTS & CTS Size of the window is fixed Source ID information of the frame is recorded Latest frame gets the smallest index Different score given to each frame using a function Smallest index gains the highest score 24 July 2008 Jamming Attacks 36

Defend Against Jamming Attacks Wireless Local Area Networks CUSUM Method Sequential Detection Change Point method Mean value of some variable under surveillance will change from negative to positive whenever a change occurs. 24 July 2008 Jamming Attacks 37

Defend Against Jamming Attacks Wireless Local Area Networks Channel is nearly fairly shared among nodes Source ID distribution of CTS / RTS frames is uniform If a node constantly occupies the channel, the uniform distribution in this period will change CUSUM is applied to detect changes in CTS window When a change point is detected, corresponding CTS frames are suspicious 24 July 2008 Jamming Attacks 38

Defend Against Jamming Attacks Wireless Local Area Networks Ct series CTS scores received sequentially In normal situation E(Ct)=c a is an upper bound of c i.e. a≥c ct=Ct-a negative value during normal operation ct=Ct-a positive value during attack CUSUM value exceeds the threshold N, jamming attack alarm launched 24 July 2008 Jamming Attacks

Defend Against Jamming Attacks Wireless Local Area Networks 24 July 2008 Jamming Attacks

Defend Against Jamming Attacks Wireless Local Area Networks Conclusion CUSUM can accurately detect RTS/CTS jamming attacks with little computation and storage cost Although these attacks cannot totally prevent other nodes from communication, they can seriously degrade the network throughput These attacks have lower traffic rates than normal jamming attack and are more difficult to detect 24 July 2008 Jamming Attacks 41

Jamming Attacks Outline SomethingRabat Anam Mahmood Rabat Anam Mahmood 9 October 2007 Jamming Attacks Outline Feasibility of Launching & Detecting Jamming Attacks in Wireless Networks Adaptive Radio Channel Allocation for Supporting Coexistence of 802.15.4 & 802.11b Defending Against Jamming Attacks in Wireless Local Area Networks References 24 July 2008 Jamming Attacks 42 42

Jamming Attacks References http://www.winlab.rutgers.edu/~trappe/Papers/JamDetect_Mobihoc.pdf http://ieeexplore.ieee.org/iel5/10422/33099/01559004.pdf?arnumber=1559004 http://www.springerlink.com/content/l2qp0215r1268p4t/fulltext.pdf 24 July 2008 Jamming Attacks 43