Mitigating malicious interference via subcarrier-level radio agility in wireless networks

Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference to a limited extent; they are especially vulnerable to a reactive jammer i.e., a jammer that injects noise upon sensing a legitimate transmission or wideband jamming. In this paper, we leverage the inherent features of OFDM (Orthogonal Frequency Division Multiplexing) to cope with such attacks. Specifically, via extensive experiments, we observe that the jamming signal experiences differing levels of fading across the composite sub-carriers in its transmission bandwidth. Thus, if the legitimate transmitter were to somehow exploit the relatively unaffected sub-carriers to transmit data to the receiver, it could achieve reasonable throughputs, even in the presence of the active jammer. We design and implement JIMS, a Jamming Interference Mitigation Scheme that exploits the above characteristic by overcoming key practical challenges. Via extensive testbed experiments and simulations we show that JIMS achieves a throughput restoration of up to 75% in the presence of an active jammer.

[1]  David Starobinski,et al.  Rate adaptation in unlicensed bands under smart jamming attacks , 2012, 2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).

[2]  Hikmet Sari,et al.  An analysis of orthogonal frequency-division multiple access , 1997, GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record.

[3]  John M. Shea,et al.  Energy-efficient jamming attack in IEEE 802.11 MAC , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[4]  Hyuk Lim,et al.  Improving spatial reuse through tuning transmit power, carrier sense threshold, and data rate in multihop wireless networks , 2006, MobiCom '06.

[5]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[6]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[8]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[9]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[10]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[11]  Sarvar Patel,et al.  Password-Authenticated Key (PAK) Diffie-Hellman Exchange , 2010, RFC.

[12]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[13]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design: Anderson/Fixed , 2003 .

[14]  Stan Baggen,et al.  Error Correction , 1984 .

[15]  Bo Sheng,et al.  On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming , 2011, WiSec '11.

[16]  Srikanth V. Krishnamurthy,et al.  ARES: an anti-jamming reinforcement system for 802.11 networks , 2009, CoNEXT '09.

[17]  Ioannis Broustis,et al.  IBAKE: Identity-Based Authenticated Key Exchange , 2012, RFC.

[18]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design: The Creation of Global Mobile Communications , 2003 .

[19]  Mika Ståhlberg Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .

[20]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design , 2003 .

[21]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[22]  Keith Q. T. Zhang,et al.  Efficient Estimation of Fast Fading OFDM Channels , 2006, 2006 IEEE International Conference on Communications.

[23]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.