DEEJAM : Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
Advantage Century Telecommunication Corp. AIL: Actively Intelligent Link-Layer Handoff Guo-Yuan Mikko Wang
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Containing DoS Attacks in Broadcast Authentication in Sensor Networks (Ronghua Wang, Wenliang Du, Peng Ning) Containing DoS Attacks in Broadcast Authentication.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Centre for Wireless Communications Opportunistic Media Access for Multirate Ad Hoc Networks B.Sadegahi, V.Kanodia, A.Sabharwal and E.Knightly Presented.
Intrusion Detection System for Wireless Sensor Networks ABSTRACT Wireless sensor networks (WSNs) consist a set of small sensor devices. These devices are.
IEEE Standardized radio technology for low power personal area networks Joe Polastre January 14, 2004.
Resilience To Jamming Attacks
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
ZigBee Module 구성도. IEEE LR-WPAN  Low power consumption  Frequent battery change is not desired and/or not feasible  Low cost  Otherwise,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
ABSTRACT Currently, drivers must utilize a third-party, such as a radio or broadband device, to learn about local traffic conditions. However, this information.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
Planning and Analyzing Wireless LAN
Ethernet Overview it the IEEE standard for Ethernet.
University of Kansas Motivation Wireless networks based on the IEEE standard require lengthy layer two configuration parameters to be set SSID (Network.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
RM-MAC: A Routing-Enhanced Multi-Channel MAC Protocol in Duty-Cycle Sensor Networks Ye Liu, Hao Liu, Qing Yang, and Shaoen Wu In Proceedings of the IEEE.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
PPR: Partial Packet Recovery Brad Karp UCL Computer Science CS 4038 / GZ06 23 rd January, 2008.
Defeating Energy-Efficient Jamming in IEEE based Wireless Networks By: y D. Wood, John A. Stankovic, and Gang Zhou, University of Virginia Presented.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
AUTO-ADAPTIVE MAC FOR ENERGY-EFfiCIENT BURST TRANSMISSIONS IN WIRELESS SENSOR NETWORKS Romain Kuntz, Antoine Gallais and Thomas No¨el IEEE WCNC 2011 Speaker.
Cascading : An Overview of the Strategy Yujie Zhu and Raghupathy Sivakumar GNAN Research Group, Georgia Tech Energy-Efficient Communication Strategy for.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Jamming for good: a fresh approach to authentic communication in WSNs
Operating System for Sensor Network
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Introduction to Networking
Data Link Issues Relates to Lab 2.
Lecture 5- Data Link Layer
Denial-of-Service Jammer Detector Training Course Worldsensing
<month year> <doc.: IEEE doc> January 2013
DK presents Division of Computer Science, KAIST
NGV Backward Interoperability: Follow-up
Presentation transcript:

DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented by: Marwa Nabil

WSNs Wireless sensor networks (WSNs) are used in many applications which often include the monitoring and recording of sensitive information. Jamming is a denial-of-service attack at the physical layer that uses intentionally interfering radio communication to disrupt the reception of messages at another node. Denial-of-service from jamming is difficult to prevent with the limited resources available to most ad hoc and wireless sensor network (WSN) nodes,  Embedded in physical environment  Devices with limited resources  Large scale static deployment A

DEEJAM Contribution Previous solutions focus on the difficult problem of,  Detecting jamming  Make burdensome assumptions about node mobility or capabilities.  Do not address sporadic jamming.  Evaluated only in simulation. Main contributions of DEEJAM is to define, implement, and evaluate (on MICAz platform) four jamming attack classes:  Interrupt jamming  Activity jamming  Scan jamming  Pulse jamming.

DEEJAM DEEJAM aims to reduce the impact of a jammer on packet loss/corruption so the network can operate while an attack is ongoing. General design approach:  Hide messages from the jammer  Evade the jammer’s search  Reduce impact of corrupted messages DEEJAM provides four complementary solutions:  Frame masking  Channel hopping  Packet fragmentation  Redundant encoding

Attack 1: Interrupt Jamming Goal: Jam only when valid radio activity is signaled from its radio hardware. The radio constantly scans for a preamble and SFD, which indicate that a packet follows. When the SFD is detected an interrupt is raised to trigger reading of packet contents from the radio’s buffer. And then sends a transmit command to the radio.

Defense 1: Frame Masking Goal: prevent interrupt upon message header reception. A sender and receiver agree on a secret pseudo-random sequence for the SFD in each packet.  KS = EKn(0)  SS = { EKs(i) mod 2 l }, l is length of SFD Unless the attacker’s radio is configured to search for the correct SFD, no interrupt will be signalled to begin jamming. The pseudo-random sequence guarantees that even if the attacker detects one message, the next will use a different SFD.

Attack 2: Activity Jamming Goal: poll channel energy to find a message. To detect activity the attacker must periodically sample the radio signal strength indicator (RSSI) or, if available, sample the radio’s clear-channel assessment (CCA) output. CCA output indicates when the RSSI is above a programmable threshold, and/or when the modulation and spreading characteristics of the received signal are compatible with those of the network.

Defense 2: Channel Hopping Goal: Evade activity check. The sender and receiver change channels to evade the jammer.  KC = EKn(1)  CS = { EKc(i) mod C }, C is number of channels (16) Attacker has 1/C chance of sampling correct channel or 1/16 in IEEE

Attack 3: Scan Jamming Goal: Find messages and jam. The attacker samples each channel as briefly as possible (Tsamp), determining whether activity is present (as in activity jamming).

Defense 3: Packet Fragmentation Goal: Hop away before jammer reacts. A node breaks an outgoing application payload into fragments to be transmitted separately, on different channels and with different SFDs. The last fragment contains a FCS for the entire payload. Fragment Fi is transmitted with the requisite PHY header on channel CSi using SFD SSi.

Attack 4: Pulse Jamming Goal: Blindly disrupt fragments. The best remaining strategy for the attacker seems to be jamming continuously or intermittently on a single channel. This avoids the (small) time spent hopping between channels (Thop), during which no jamming would occur. Corrupting one of the fragments is sufficient to cause the entire packet to be dropped, since the FCS of the assembled packet will be incorrect at the receiver.

Defense 4: Redundant Encoding Goal: Recover from damaged fragments. A Redundant Encoding scheme is used, that allows the receiver to recover from one or more corrupted fragments The receiver compares each fragment pair to determine whether they are different. If so, it must recalculate the FCS for the assembled packet using each fragment copy until a correct FCS is found. Requirement for CS: Ci ≠ Ci+1. To ensures that consecutive fragment copies are not transmitted on the same channel.

Evaluation - Performance (with attacks)

Evaluation - Performance (No attacks)

Questions