The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Medium Access Issues David Holmer
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1-1 Topology Control. 1-2 What’s topology control?
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Resilience To Jamming Attacks
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
MAC Protocol By Ervin Kulenica & Chien Pham.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
1 Jamming in Wireless Sensor Networks Ertan Onur December 13 th, 2006 Boğaziçi University.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University Network/Computer Security.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
UCAN: A Unified Cellular and Ad Hoc Network Architecture Presenter: Tripp Parker Authors: Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Routing and Scheduling for mobile ad hoc networks using an EINR approach Harshit Arora Advisor : Dr. Harlan Russell Mobile ad Hoc Networks A self-configuring.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
Ad Hoc Network.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Self-stabilizing energy-efficient multicast for MANETs.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Lab 7 – CSMA/CD (Data Link Layer Layer)
TCP and MAC interplay in Wireless Ad Hoc Networks
CS 457 – Lecture 7 Wireless Networks
Nash equilibrium for Proactive Anti-jamming in IEEE e
Goal Control the amount of traffic in the network
The Impact of Multihop Wireless Channel on TCP Performance
DK presents Division of Computer Science, KAIST
Protocols.
Cross-layer Analysis for detecting Wireless Misbehavior
Protocols.
Presentation transcript:

The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless Information Network Laboratory, Rutgers University Presented by Zigeng Wang and Shaobo Zheng 1

What is Jamming? 2 Useful Information BobAlice

What is Jamming? 3 Useful Information BobAlice Eve (Jammer) Disturbing information

What is Jamming? Jamming is the (usually deliberate) transmission of radio signals that disrupt communications by decreasing the signal-to- noise ratio. Radio interference attack In network scenario, how to measure the effectiveness of a Jammer? 4

Jamming Performance Metrics Packet Send Ratio (PSR) The ratio of packets that are successfully sent out by a legitimate traffic source compared to the number of packets it intends to send out at the MAC layer. Packet Delivery Ratio (PSR) The ratio of packets that are successfully delivered to a destination compared to the number of packets that have been sent out by the sender. 5

Jamming Attack Models Constant Jammer Continually emitting random signals Deceptive Jammer Constantly injecting regular packets Random Jammer Switching between sleeping and Jamming Reac tive Jammer Start transmission when senses activity on the channel 6

Jamming Attack Models 7

Jamming Attack Detection Signal Strength discrimination - Detect jamming by extracting spectral characteristics of the signal strength for the basis of discrimination by implying higher order crossings (HOC) 8

Jamming Attack Detection Signal Strength Signal Strength Spectral Discrimination 9

Jamming Attack Detection Signal Strength Signal Strength Spectral Discrimination 10

Jamming Attack Detection Carrier Sensing Time Thresholding mechanism: Each time A wishes to transmit, it will monitor the time spent sensing the channel, and if that time is above a threshold (or if it is consistently above the threshold), it will declare that a jamming is occurring. Theoretically calculating is hard Statistics approach 11

Jamming Attack Detection 12

Jamming Attack Detection 13

Jamming Attack Detection Packet Delivery Ratio Any one of the four jammers, if placed within a reasonable distance from the receiver, can cause the corresponding PDR to become close to 0. Even under such a congestion level, the PDR measured by the receiver is still around 78%. It is not as effective for other network dynamics, such as a sender battery failure, or the sender moving out of the receiver's communication range. 14

Basic Detection Summary Both Signal Strength and Carrier Sensing time can only detect the constant and deceptive jammer. Neither of these two statistics is effective in detecting the random or the reactive jammer. Packet Delivery Ratio is a powerful statistic to determine Jamming vs. congestion. It can not account for all network dynamics. 15

We need Consistency Checks to be Sure 1.Signal Strength Consistency Checks 2.Location Consistency Checks Assumptions Each node detects whether it is jammed Each node maintains a neighbor list from routing layer Network deployment is dense so each node has several neighbors All legitimate nodes participate by sending heartbeat beacons( allows for reliable estimate of PDR over time) 16

Advanced Jamming Detection Signal Strength Consistency Checks In order to combat false detections due to legitimate causes of link degradation, we use the signal strength as a consistency check. Specifically, we check to see whether a low PDR value is consistent with the signal strength that is measured. it may not be practical to sample the signal strength with a fine granularity over a long window of time 17

Signal Strength Consistency Checks

Observed Normal relationships High signal strength yields a high PDR Low signal strength yields a low PDR Jammed scenario: a high signal strength but a low PDR The Jammed region has above 99% signal strength confidence intervals and whose PDR is below 65% Signal Strength Consistency Checks Jammed Region PDR % PDR VS. SS SS(dBm)

Advanced Jamming Detection Location Consistency Checks a proactive consistency check. all legitimate neighbor nodes transmit with a fixed power level requires the support of a localization infrastructure every node periodically advertise its current location and further let each node keep track of both the PDR and the location of its neighbors. 20

Advanced Jamming Detection 21

PDR VS Distance Observations: Neighbors that are close should have high PDR values, if they have low PDR values they are Jammed All nodes advertise their current location and their PDRs to their neighbors to ensure there is a minimum amount of traffic to establish PDR. Thus PDR = 0 if no packets received Similar to the SS consistency check. An initial baseline to represent the profile of a normal environment (PDR,d) for each node. If a lower PDR is observed than should be for a given distance under normal radio conditions than the node declares it is Jammed. 22

Countermeasures : Physical layer design technologies such as spread spectrum work but have not found wide spread deployment in commodity wireless devices. 23

Conclusions Protecting our wireless networks is important Jamming is a viable threat Detecting Jamming is the first step in defeating it 24