ARES: an Anti-jamming REinforcement System for 802.11 Networks Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Interference Alignment and Cancellation EE360 Presentation Omid Aryan Shyamnath Gollakota, Samuel David Perli and Dina Katabi MIT CSAIL.
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Xiaolong Zheng, Zhichao Cao, Jiliang Wang, Yuan He, and Yunhao Liu SenSys 2014 ZiSense Towards Interference Resilient Duty Cycling in Wireless Sensor Networks.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Strider : Automatic Rate Adaptation & Collision Handling Aditya Gudipati & Sachin Katti Stanford University 1.
Presented at ICC 2012 – Wireless Network Symposium – June 14 th 2012.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University “Broadnets.
1 A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks Tae-Suk Kim*, Serdar Vural*, Ioannis Broustis*, Dimitris Syrivelis.
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
The Capacity of Wireless Ad Hoc Networks
Resilience To Jamming Attacks
Cooperative MIMO in Wireless Networks: Where are we? Srikanth Krishnamurthy.
1 SMART ANTENNA TECHNIQUES AND THEIR APPLICATION TO WIRELESS AD HOC NETWORKS JACK H. WINTERS /11/13 碩一 謝旻欣.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology.
Towards a Widely Applicable SINR Model for Wireless Access Sharing Christian Scheideler University of Paderborn Joint work with Andrea Richa and Stefan.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Doc.: IEEE /1153r0 Submission September 2013 Laurent Cariou (Orange)Slide 1 Simulation scenario proposal Date: Authors:
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University Network/Computer Security.
MDG: Measurement-Driven Guidelines for WLAN Design Ioannis Broustis, Konstantina Papagiannaki, Srikanth V. Krishnamurthy, Michalis Faloutsos, Vivek.
Understanding the Real-World Performance of Carrier Sense MIT Computer Science and Artificial Intelligence Laboratory Networks and Mobile Systems
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Cognitive Radio Networks
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks IEEE INFOCOM 2008 Mehmet C. Vuran and Ian F.
Oct 26, 2007IMC 2007 Understanding the Limitations of Transmit Power Control for Indoor WLANs Vivek Vishal Shrivastava Dheeraj Agrawal Arunesh Mishra Suman.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
MIMO: Challenges and Opportunities Lili Qiu UT Austin New Directions for Mobile System Design Mini-Workshop.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
Experimental Evaluation of Co-existent LTE-U and Wi-Fi on ORBIT Problem DefinitionExperimental Procedure Results Observation WINLAB Conclusion Samuel
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Adnan Quadri & Dr. Naima Kaabouch Optimization Efficiency
White Space Networking with Wi-Fi like Connectivity
Reporting Mechanisms Needed for DFS to Support Regulatory Compliance
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
LOS Discovery for Highly Directional Full Duplex RF/FSO Transceivers
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Understanding the Real-World Performance of Carrier Sense
Denial-of-Service Jammer Detector Training Course Worldsensing
Spectrum Sharing in Cognitive Radio Networks
of the IEEE Distributed Coordination Function
DK presents Division of Computer Science, KAIST
LOS Discovery for Highly Directional Full Duplex RF/FSO Transceivers
Presentation transcript:

ARES: an Anti-jamming REinforcement System for Networks Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis ACM CoNEXT 2009

Launching DoS Attacks in WiFi networks is easy 2

3 Alice senses medium busy

Launching DoS Attacks in WiFi networks is easy 4 Packet collisions

Launching DoS Attacks in WiFi networks is easy 5 Jammer can be: -Continuous -Intermittent: random or reactive Xu et al [MobiHoc 2005]

Launching DoS Attacks in WiFi networks is easy How to deal with jammers? Frequency hopping ?? Two flavors: (a) Reactive, (b) Proactive 6 Frequency hopping is weak for current systems [WiOpt 2009]: Only 4 jammers to block entire 5GHz spectrum

Launching DoS Attacks in WiFi networks is easy 7 Can we alleviate jamming effects without relying on frequency hopping?

Our Contributions/Findings Fixed rates are often preferable in the presence of a jammer  Rate adaptation converges slowly Clear Channel Assessment (CCA) tuning is important:  The transmitter can ignore jamming signals  The receiver can latch on the desired signal more easily ARES: A measurement driven anti-jamming system which utilizes rate and power control techniques.  ARES fights jammer, instead of trying to avoid it Testbed evaluations show the potentials of ARES:  Up to 3x better performance 8

Roadmap Introduction Rate Control Power Control System architecture Evaluation Conclusions 9

Interaction between random jamming and rate control 10 Jamming effects last beyond the jamming period when rate control is used !

Rate Control: Fixed or Variable? In general, rate adaptation improves performance under benign condition. But, in the presence of an intermittent jammer The rate control algorithm might be slow to converge to optimum rate Remedy: Fixed rate assignments increase immediately throughput But, performance depends on channel conditions 11 How to decide when to allow rate adaptation and when not?

Deciding when to perform rate adaptation With perfect knowledge of:  Application data rate R a  Jammer’s distribution  Rate control algorithm used  Link quality (e.g., PDR)  Effectiveness of jammer (measured via the throughput sustained on the link) we can analytically decide between fixed rate and rate control. 12 Average throughput over a jamming cycle. Effectiveness of jammer Rate control algorithm Link Quality Application rate

Fixed rate provides high throughput gains Throughput gains are indeed viable in practice with fixed rates under the presence of random jamming. 13 Corollary: Use rate control only when the link is very “poor”. E.g. for R a =54Mbps, rate adaptation is preferred only if PDR is as low as 0.15 (for sample rate)

Practical algorithm for deciding when to rate control However, perfect knowledge is not realistic Our Markovian Rate Control (MRC) module is inspired from the analysis but does not require knowledge of any of the parameters. 14 -i = 0 - keep track of rate R - i++ Jamming In: k Jam off & i == k Set rate at R Jam off & i < k Jamming

MRC performs well in practice Parameter k controls the performance of MRC. MRC can be tuned to give performance close to the “optimal”. 15

Roadmap Introduction Rate Control Power Control System architecture Evaluation Conclusions 16

Power Control Rate control removes transient jamming effects. What about constant jamming effects? Power Control:  Power adaptation  Clear Channel Assessment (CCA) tuning Power adaptation helps only when:  Transmitter is not in the jammer’s range.  When low transmissions rates are used. Increasing CCA at the transceivers can restore the benign throughput with high probability.  Care for avoiding starvation. 17

Increasing power helps when transmission rate is low Observation 1: Probability of accessing the medium does not depend on transmission power. Observation 2: Given that a packet is transmitted  Power adaptation increases “Signal / Jamming Interference Ratio.”  Improvements when low transmission rates are used. 18 Restricted solution. Ideal solution should be agnostic to: Jammer’s range Rate used

Dealing with high power jammers In the presence of a high power jammer  The transmitter needs to be able to ignore jamming signals.  The receiver must be able to decode the legitimate packet.  Tuning the transmission power increases the legitimate signal level at the receiver, but not very helpful when the jamming interference is also large enough. Observation 3: CCA threshold dictates both transmitting and receiving functionality  Transmitter: total energy at the transmitter’s antenna < CCA  idle medium  Receiver: signals with energy < CCA  noise  Increasing the CCA threshold does NOT increase the SNR at the receiver.  It helps the receiver latch on the legitimate signal. 19

Side effects of power control Care needs to be taken for possible side effects:  Transmitter: unintentionally become a jammer  starve other nodes  [Mahtre et al – Infocom 2007] : P  CCA = constant  Receiver: blindly increasing CCA  legitimate signals regarded as noise  Upper bound at CCA value for not ignoring signals of interest 20 Connectivity starts to be compromised ! !

How to perform Power Control? Shadow fading variation Δ: Signal levels vary from their average value by ΔdBm. RSSI ij is the signal level at node j due to the transmission of node i (i,j = T(transmitter), R(receiver) and J(jammer)). Heuristic for CCA on the link (CCA L ):  If max(RSSI JT, RSSI JR ) ≤ min(RSSI RT, RSSI TR ) – Δ CCA L = min(RSSI RT, RSSI TR ) – Δ  If max(RSSI JT, RSSI JR ) ≤ min(RSSI RT, RSSI TR ) – 2Δ  Link operates as in jamming free environment. 21

ARES: System Design ARES performs rate control and power control. Rate control uses the Markov Rate controller. Power control sets the CCA value based on the RSSIs and the value for the shadow fading variation Δ. Both rate and power control are measurement-driven heuristics. 22 Jammer detected Xu et al [MobiHoc 2005] Is CCA tuneable? Yes Power Control Jamming resolved? Rate Control No END Yes No

Roadmap Problem motivation Our Contributions/Findings Background/Related Studies System Design  Rate Control Measurements  Power Control Measurements Evaluation Conclusions 23

Evaluation Setup Experimental evaluation on our indoor wireless testbed. Hardware used:  Intel-2915 with ipw2200 driver/firmware (allows tuning CCA).  EMP G  Ralink RT2860 (support n) Jammer implementation:  Utilize Intel cards  CCA  0 dBm  User space utility that sends broadcast packets back – to – back 24

Effect of rate control on n Rate Control only Benchmark results: using analytical assessments ARES: Improves performance by up to 100% 25

Mobile Jammer The jammer (constant) moves to the vicinity of the legitimates nodes, stays there for k seconds and leaves. ARES utilizes power control module  Increased CCA to overcome the presence of the jammer  Rate adaptation module is not of much benefit in this scenario. ARES increases throughput by >150% 26

Using rate control to avoid neighbor starvation ARES (MRC) improves neighbors’ AP throughput. Avoid transmissions at lower rates during the sleeping cycles.  Neighbor APs and links have to wait less time to obtain the medium.  Improved overall, networked setting performance With one neighbor AP (and one jammed) 23% improvement Adding more APs reduces the benefits due to increased contention. 27

Roadmap Problem motivation Our Contributions/Findings Background/Related Studies System Design  Rate Control Measurements  Power Control Measurements Evaluation Conclusions 28

Conclusions Fixed rate assignments can be beneficial in jammed environments. Power level tuning helps only at low rates and low power jammers. Tuning the CCA threshold enables:  The transmitter to ignore jamming signals  The receiver capture the desired packet(s) Evaluations of our measurement driven prototype system shows that rate and power control can efficiently fight against the jammer.  Frequency hopping tries to avoid the jammer. 29

THANK YOU !! QUESTIONS? 30