Jamming and Anti-Jamming in IEEE 802.11 based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
Networks: Wireless LANs1 Wireless Local Area Networks.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
A Scalable MAC Protocol for Next-Generation Wireless LANs Zakhia (Zak) Abichar, J. Morris Chang, and Daji Qiao Dept. of Electrical and Computer Engineering.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Module C- Part 1 WLAN Performance Aspects
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Network Technology CSE Network Technology CSE3020 Week 9.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Packet Loss Characterization in WiFi-based Long Distance Networks Authors : Anmol Sheth, Sergiu Nedevschi, Rabin Patra, Lakshminarayanan Subramanian [INFOCOM.
Wireless LAN Simulation - IEEE MAC Protocol
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Journal on Selected Areas in Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space Stefan Geirhofer and Lang Tong, Cornell University Brian M. Sadler, United.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
WLAN.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs
Medium Access Control MAC protocols: design goals, challenges,
Idle sense.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
CS 457 – Lecture 7 Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Author: Giuseppe Bianchi
Wireless LAN Simulation IEEE MAC Protocol
연구 목표 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs. M. Heusse, F. Rousseau, R. Guillier, and A.
of the IEEE Distributed Coordination Function
The System Issues of Rate Adaptation
Enhanced Backoff Scheme in CSMA/CA for IEEE
Presentation transcript:

Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A A A A

Introduction Wireless communications are highly susceptible to interference To protect some devices from interference, frequency spectrum is allocated into – Licensed band: a service provider owns a part of the spectrum. – Unlicensed band: everybody has equal right to use it as long they conform to the regulations

Introduction IEEE based WLANs use unlicensed spectrum. Every user shares the channel with every other device operating in that band Every device has equal right to access the channel. Presence of other devices can severely affect the performance.

Example: Interference from cordless phone Phone turned OFFPhone turned ON

Example: Interference from microwave oven

And Interference from fifth floor lab

Jamming Jamming is intentionally interfering to decrease the performance of a system. It can be done at different layers. Physical (PHY) layer jamming – Continuous transmission of signal – Periodic transmission – Spread spectrum technologies are extensively used to combat this type of jamming.

Jamming attacks are possible at other layers. Here we focus on MAC layer of standard. DCF * is the commonly used MAC technique in the IEEE WLAN standard. *DCF: Distributed Coordination Function

Distributed Coordinated Function(DCF) A station that needs to transmit needs to – Sense idle channel for DIFS – Choose a random backoff timer between 0 and contention window(CW), and counts down. – Transmit after the expiry of backoff timer

Distributed Coordinated Function(DCF) – On sensing a busy medium, backoff timer is frozen. – Timer is restarted on sensing idle channel for DIFS – A failure will cause in exponential increase in CW size.

Jammer objective Jammer’s objective is to disrupt as much as possible. Compared to transmitting continuously, transmitting only when required is more effective in terms of power. For jamming devices with limited energy, jamming every packet might not be a good strategy.

Markov Chain Model for DCF This behavior can be modeled as a Markov chain to study the effect of jamming on the system.

Throughput From this model, the probability of a successful transmission( S ), failed transmission ( F ) or the medium is idle( 1-S-F ) in a slot can be derived. Throughput can be defined as

T s and T c T s is the time required to transmit a frame successfully T c is the time consumed due to a failure.

Testbed jammer We built a jammer to observe the effect of jamming experimentally. Ath5k, a driver for WLAN cards, is modified to implement the jamming functionality. We used Atheros proprietary XR mode to stomp an ongoing transmission.

Packet failure probability Here we assume that the jammer’s packet always destroys the target packet.

Throughput Throughput monotonically decreases with increase in jamming probability.

Power expenditure of jammer

DCF: shortcoming Jammer’s power expenditureReason CW size is pushed to the maximum value Transmission probability decreases. Longer delays for transmission Smaller energy consumption for jammer.

ANTI JAMMING DCF Modification Detection of jamming

DCF: modification Modified DCF Motivation Standard DCF reduces the transmission probability with collision DCF is modified to increase the jammer’s energy expenditure with jamming probability.

Comparison of power expenditure of jammer for modified and standard DCF (3 stations)

Comparison of power expenditure of jammer for modified and standard DCF (10 stations)

Throughput comparison 10 stations 50 stations

Probability of collision Picture showing the collision probability versus the number of nodes in the system.

Detection of jamming After transmitting K packets, each station looks at the number of times it has been in each transmitting state i.e., Markov Chain Model for DCF Markov Chain Model for DCF The problem of detecting jamming in the presence of normal collisions is a composite hypothesis testing problem. It is solved using Generalized Likelihood Ratio Test(GLRT).

GLRT Hypotheses H 0 and H 1 are defined as follows The test takes the following form

ROC curve Picture showing Receiver Operating Characteristics of the detector

Conclusions A jammer is implemented to verify the effect of jamming in IEEE wireless network. The Markovian model models the DCF very accurately. Standard DCF favors jamming probability of 1. DCF is modified to increase the rate at which jammer expends energy.

Future Work Implement selective jamming.

Thank you.

Additional slides Backup

Power comparison of jammer w/ and w/o collision detection 10 stations50 stations