Persistent jamming in wireless local area networks: Attack and defense

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 775
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Il-Guko
dc.contributor.authorKim, Myung-Chulko
dc.date.accessioned2016-12-01T04:46:47Z-
dc.date.available2016-12-01T04:46:47Z-
dc.date.created2016-06-22-
dc.date.created2016-06-22-
dc.date.created2016-06-22-
dc.date.issued2016-11-
dc.identifier.citationCOMPUTER NETWORKS, v.109, pp.67 - 83-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/214422-
dc.description.abstractWireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this paper, we demonstrate that reactive jamming is only effective against channel hopping WLAN devices in non-dense networks and that it is not effective in dense networks. Then, we propose a new jamming attack called “persistent jamming”, which is a modified reactive jamming that is effective in dense networks. The proposed persistent jamming attack can track a device that switches channels using the following two features, and it can attack the specific target or a target group of devices. The first feature is that the proposed attack can use the partial association ID (PAID), which is included for power saving in the IEEE 802.11ac/af/ah frame headers, to track and jam the targets. The second feature is that it is possible to attack persistently based on device fingerprints in IEEE 802.11a/b/g/n legacy devices. Our evaluation results demonstrate that the proposed persistent jamming can improve the attack efficiency by approximately 80% in dense networks compared with the reactive jamming scheme, and it can also shut down the communication link of the target nodes using 20 dBm of jamming power and a 125 ms response time. In order to defend against the persistent jamming attack, this paper proposes three defense mechanisms for anti-tracking and anti-jamming; a digital fingerprints predistortion, dynamic ID allocation, and dual channel friendly jamming. The experimental results demonstrate that the proposed defense mechanisms are feasible and effective to significantly decrease the device tracking success ratio of the persistent jamming attack.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectERROR VECTOR MAGNITUDE-
dc.subjectPHYSICAL LAYER-
dc.subjectAUTHENTICATION-
dc.titlePersistent jamming in wireless local area networks: Attack and defense-
dc.typeArticle-
dc.identifier.wosid000388546400008-
dc.identifier.scopusid2-s2.0-84977619956-
dc.type.rimsART-
dc.citation.volume109-
dc.citation.beginningpage67-
dc.citation.endingpage83-
dc.citation.publicationnameCOMPUTER NETWORKS-
dc.identifier.doi10.1016/j.comnet.2016.06.024-
dc.contributor.localauthorKim, Myung-Chul-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorWLAN-
dc.subject.keywordAuthorDense network-
dc.subject.keywordAuthorPersistent jamming-
dc.subject.keywordAuthorChannel hopping-
dc.subject.keywordAuthorDevice tracking-
dc.subject.keywordAuthorID-
dc.subject.keywordAuthorFingerprint-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorAnti-tracking-
dc.subject.keywordAuthorAnti-jamming-
dc.subject.keywordPlusERROR VECTOR MAGNITUDE-
dc.subject.keywordPlusPHYSICAL LAYER-
dc.subject.keywordPlusAUTHENTICATION-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0