MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks

Wireless mesh networks represent an emerging network architecture which has been actively studied and standardized for the last several years. Because of their flexible network architecture, wireless mesh networks can provide alternative paths even when wireless links are broken by node failures or routing attacks. Among a variety of mesh network protocols, we focus on the recently ratified IEEE 802.11s WLAN mesh standard. With analysis of the path selection scheme in 802.11s, we show the effect of conventional jamming on 802.11s-based wireless mesh networks via simulation. We then introduce mesh jamming, which can more efficiently attack the mesh path selection process by exploiting cross-layer knowledge and more harmfully influence on the path discovery performance compared to conventional jamming. We propose a proof-of-concept defense, bi-directional path discovery to mitigate the devastating effect of mesh jamming.

[1]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[2]  Michalis Faloutsos,et al.  Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric? , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Johannes Lessmann,et al.  Rope ladder routing: Position-based multipath routing for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[4]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[5]  Guevara Noubir,et al.  Quantifying the Impact of Efficient Cross-Layer Jamming Attacks via Network Traffic Flows , 2022 .

[6]  Nitin H. Vaidya,et al.  Proceedings of the sixteenth annual international conference on Mobile computing and networking , 2010, MobiCom 2010.

[7]  Wenyuan Xu,et al.  Short paper: Jamming-resilient multipath routing leveraging availability-based correlation , 2011, WiSec '11.

[8]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[9]  Mihui Kim,et al.  DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System , 2010, Sensors.

[10]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[11]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[12]  Satish K. Tripathi,et al.  A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  Rachelin Sujae Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  Marius Portmann,et al.  Experimental evaluation of measurement-based SINR interference models , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[16]  Ashish Kumar,et al.  Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2013 .