skip to main content
10.1145/2627788.2627798acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

A real-time and protocol-aware reactive jamming framework built on software-defined radios

Published:18 August 2014Publication History

ABSTRACT

This paper develops a software-defined radio (SDR) framework for real-time reactive adversarial jamming in wireless networks. The system consists of detection and RF response infrastructure, implemented in the FPGA of a USRP N210 and designed to function with the open source GNU Radio SDR library. The framework can be used to implement a fast turnaround reactive jamming system capable of timely RF response within \textit{80ns} of signal detection. Our framework also allows for full control and feedback from the FPGA hardware to the GNU Radio-based cognitive radio backend, making it applicable to a wide range of preamble-based wireless communication schemes. This paper presents the capabilities, design, and experimental evaluation of this framework. Using this platform, we demonstrate real-time reactive jamming capabilities in both WiFi (802.11g) and mobile WiMAX (802.16e) networks and quantify jamming performances by measuring the network throughput using the iperf software tool. The results indicate that our system works reliably in real time as a reactive jammer and can be used for practical assessments of modern jamming and secure communication techniques.

References

  1. GNU Radio. http://gnuradio.org/redmine/projects/gnuradio.Google ScholarGoogle Scholar
  2. WARP Project. http://warpproject.org.Google ScholarGoogle Scholar
  3. E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the Performance of IEEE 802.11 under Jamming. In Proc. of INFOCOM, volume 0448330, pages 1265--1273, Apr. 2008.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Chen, S. Sen, M. Chiang, and D. J. Dorsey. A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications. In Proc. of CISS, 2013.Google ScholarGoogle Scholar
  5. S. Gollakota and D. Katabi. iJam : Jamming Oneself for Secure Wireless Communication. Technical report, MIT, 2010.Google ScholarGoogle Scholar
  6. S. Gollakota and D. Katabi. Physical layer wireless security made fast and channel independent. In Proc. of IEEE INFOCOM, pages 1125--1133, Apr. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Li, I. Koutsopoulos, and R. Poovendran. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In Proc. of IEEE INFOCOM, pages 1307--1315, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Liu and P. Ning. BitTrickle: Defending against broadband and high-power reactive jamming attacks. In Proc. of IEEE INFOCOM, pages 909--917, Mar. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  9. T. Pongthawornkamol and K. Nahrstedt. Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN. In Proc. of IEEE GLOBECOM, Dec. 2011.Google ScholarGoogle Scholar
  10. S. Prasad and D. J. Thuente. Jamming attacks in 802.11g - A cognitive radio based approach. In Proc. of IEEE MILCOM, pages 1219--1224, Nov. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  11. W. Shen, P. Ning, X. He, and H. Dai. Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. In Proc. of IEEE Symposium on Security and Privacy, pages 174--188, May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. I. Shin, Y. Shen, Y. Xuan, M. T. Thai, and T. Znati. A Novel Approach Against Reactive Jamming Attacks. Journal of Ad Hoc & Sensor Wireless Networks, 12(1--2):125--149, 2011.Google ScholarGoogle Scholar
  13. D. J. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proc. of IEEE MILCOM, pages 1075--1081, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Reactive Jamming in Wireless Networks - How Realistic is the Threat? In Proc. of ACM WiSec, pages 47--52, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc, pages 46--57, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A real-time and protocol-aware reactive jamming framework built on software-defined radios

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SRIF '14: Proceedings of the 2014 ACM workshop on Software radio implementation forum
      August 2014
      100 pages
      ISBN:9781450329958
      DOI:10.1145/2627788

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 August 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SRIF '14 Paper Acceptance Rate10of18submissions,56%Overall Acceptance Rate23of41submissions,56%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader