skip to main content
10.1145/1023646.1023661acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Channel surfing and spatial retreats: defenses against wireless denial of service

Authors Info & Claims
Published:01 October 2004Publication History

ABSTRACT

Wireless networks are built upon a shared medium that makes it easy for adversaries to launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing sources from communicating. These attacks can be easily accomplished by an adversary by either bypassing MAC-layer protocols, or emitting a radio signal targeted at jamming a particular channel. In this paper we present two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack. The first strategy, channel surfing, is a form of spectral evasion that involves legitimate wireless devices changing the channel that they are operating on. The second strategy, spatial retreats, is a form of spatial evasion whereby legitimate mobile devices move away from the locality of the DoS emitter. We study both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network. We evaluate several of our proposed strategies and protocols through ns-2 simulations and experiments on the Berkeley mote platform.

References

  1. B. Potter, "Wireless security's future," IEEE Security and Privacy Magazine, vol. 1, no. 4, pp. 68--72, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24--30, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in 8th ACM International Conference on Mobile Computing and Networking, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Papadimittratos and Z. Haas, "Secure routing for mobile ad hoc networks," in SCS Communication Networks and Distributed Systems Modeling and Simulations Conference (CNDS 2002), San Antonio, 2002.Google ScholarGoogle Scholar
  5. J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multi-layer ad-hoc networks," Special Issue of Wireless Communications and Mobile Computing, 2002.Google ScholarGoogle Scholar
  6. Y.C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proceedings of IEEE Infocom 2003, 2003, pp. 1976--1986.Google ScholarGoogle Scholar
  7. Q. Huang, H. Kobayashi, and B. Liu, "Modeling of distributed denial of service attacks in wireless networks," 2003, vol. 1, pp. 41--44.Google ScholarGoogle Scholar
  8. AusCERT, "Aa-2004.02 - denial of service vulnerability in ieee 802.11 wireless devices," http://www.auscert.org.Google ScholarGoogle Scholar
  9. L. Kleinrock and F. Tobagi, "Packet switching in radio channels: Part i--carrier sense multiple-access modes and their throughput-delay characteristics," IEEE Trans. on Communications, vol. 23, no. 12, pp. 1400--1416, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  10. L. Kleinrock, Queueing Systems, Volume 2: Computer Applications, John Wiley & Sons, 1976.Google ScholarGoogle Scholar
  11. H. V. Poor, An Introduction to Signal Detection and Estimation, Springer Verlag, 2nd edition, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F.H.P. Fitzek and M. Reisslein, "MPEG-4 and H.263 video traces for network performance evaluation," IEEE Network, vol. 15, no. 6, pp. 40--54, November/December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Kedem, Time Series Analysis by Higher Order Crossings, IEEE Press, 1994.Google ScholarGoogle Scholar
  14. Chipcon, "Chipcon cc1000 radio's datasheet," http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf.Google ScholarGoogle Scholar
  15. B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Andrea Goldsmith, "Stanford University EE 359 Wireless Communications Course Notes," http://www.stanford.edu/class/ee359/.Google ScholarGoogle Scholar
  17. S. Pack and Y. Choi, "Pre-authenticated fast handoff in a public wireless lan based on ieee 802.1x model," in Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications. 2002, pp. 175--182, Kluwer, B.V. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Fu, T. Chen, A. Festag, H. Karl, G. Schäfer, and C. Fan, "Secure, QoS-enabled mobility support for IP-based networks," in Proc. IP Based Cellular Network Conference (IPCN), Paris, France, 2003.Google ScholarGoogle Scholar
  19. A. Wood, J. Stankovic, and S. Son, "JAM: A jammed-area mapping service for sensor networks," 2003, pp. 286--297. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Channel surfing and spatial retreats: defenses against wireless denial of service

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
          October 2004
          104 pages
          ISBN:158113925X
          DOI:10.1145/1023646

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate10of41submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader