ABSTRACT
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing sources from communicating. These attacks can be easily accomplished by an adversary by either bypassing MAC-layer protocols, or emitting a radio signal targeted at jamming a particular channel. In this paper we present two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack. The first strategy, channel surfing, is a form of spectral evasion that involves legitimate wireless devices changing the channel that they are operating on. The second strategy, spatial retreats, is a form of spatial evasion whereby legitimate mobile devices move away from the locality of the DoS emitter. We study both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network. We evaluate several of our proposed strategies and protocols through ns-2 simulations and experiments on the Berkeley mote platform.
- B. Potter, "Wireless security's future," IEEE Security and Privacy Magazine, vol. 1, no. 4, pp. 68--72, 2003. Google ScholarDigital Library
- L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24--30, 1999. Google ScholarDigital Library
- Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in 8th ACM International Conference on Mobile Computing and Networking, September 2002. Google ScholarDigital Library
- P. Papadimittratos and Z. Haas, "Secure routing for mobile ad hoc networks," in SCS Communication Networks and Distributed Systems Modeling and Simulations Conference (CNDS 2002), San Antonio, 2002.Google Scholar
- J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multi-layer ad-hoc networks," Special Issue of Wireless Communications and Mobile Computing, 2002.Google Scholar
- Y.C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proceedings of IEEE Infocom 2003, 2003, pp. 1976--1986.Google Scholar
- Q. Huang, H. Kobayashi, and B. Liu, "Modeling of distributed denial of service attacks in wireless networks," 2003, vol. 1, pp. 41--44.Google Scholar
- AusCERT, "Aa-2004.02 - denial of service vulnerability in ieee 802.11 wireless devices," http://www.auscert.org.Google Scholar
- L. Kleinrock and F. Tobagi, "Packet switching in radio channels: Part i--carrier sense multiple-access modes and their throughput-delay characteristics," IEEE Trans. on Communications, vol. 23, no. 12, pp. 1400--1416, 1975.Google ScholarCross Ref
- L. Kleinrock, Queueing Systems, Volume 2: Computer Applications, John Wiley & Sons, 1976.Google Scholar
- H. V. Poor, An Introduction to Signal Detection and Estimation, Springer Verlag, 2nd edition, 1994. Google ScholarDigital Library
- F.H.P. Fitzek and M. Reisslein, "MPEG-4 and H.263 video traces for network performance evaluation," IEEE Network, vol. 15, no. 6, pp. 40--54, November/December 2002. Google ScholarDigital Library
- B. Kedem, Time Series Analysis by Higher Order Crossings, IEEE Press, 1994.Google Scholar
- Chipcon, "Chipcon cc1000 radio's datasheet," http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf.Google Scholar
- B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM), August 2000. Google ScholarDigital Library
- Andrea Goldsmith, "Stanford University EE 359 Wireless Communications Course Notes," http://www.stanford.edu/class/ee359/.Google Scholar
- S. Pack and Y. Choi, "Pre-authenticated fast handoff in a public wireless lan based on ieee 802.1x model," in Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications. 2002, pp. 175--182, Kluwer, B.V. Google ScholarDigital Library
- X. Fu, T. Chen, A. Festag, H. Karl, G. Schäfer, and C. Fan, "Secure, QoS-enabled mobility support for IP-based networks," in Proc. IP Based Cellular Network Conference (IPCN), Paris, France, 2003.Google Scholar
- A. Wood, J. Stankovic, and S. Son, "JAM: A jammed-area mapping service for sensor networks," 2003, pp. 286--297. Google ScholarDigital Library
Index Terms
- Channel surfing and spatial retreats: defenses against wireless denial of service
Recommendations
The feasibility of launching and detecting jamming attacks in wireless networks
MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computingWireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. ...
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
WiSec '09: Proceedings of the second ACM conference on Wireless network securityWe address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulnerability, we consider a sophisticated adversary who exploits knowledge of ...
Spatial fairness in multi-channel CSMA line networks
VALUETOOLS '14: Proceedings of the 8th International Conference on Performance Evaluation Methodologies and ToolsIn this paper we consider a multi-channel random-access carrier-sense multiple access (CSMA) line network with n saturated links, where each link can be active on at most one of the C available channels at any time. Using the product form solution of ...
Comments