FIJI: Fighting Implicit Jamming in 802.11 WLANs

The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on a large-scale indoor testbed, under different traffic scenarios, network densities and jammer locations. Our measurements suggest that FIJI detects such jammers in real-time and alleviates their impact by allocating the available bandwidth in a fair and efficient way.

[1]  Serge Fdida,et al.  Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks , 2006, MSWiM '06.

[2]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[3]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[4]  Jin-Hee Choi,et al.  Eliminating the Performance Anomaly of 802.11b , 2005, ICN.

[5]  Michalis Faloutsos,et al.  MDG: measurement-driven guidelines for 802.11 WLAN design , 2007, MobiCom '07.

[6]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[7]  Konstantina Papagiannaki,et al.  The need for cross-layer information in access point selection algorithms , 2006, IMC '06.

[8]  Guevara Noubir,et al.  On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.

[9]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[10]  Srinivasan Seshan,et al.  Self-management in chaotic wireless deployments , 2005, MobiCom '05.

[11]  Serge Fdida,et al.  SDT.11b : Un Schéma à Division de Temps pour éviter l'anomalie de la couche MAC 802.11b , 2005 .

[12]  Michalis Faloutsos,et al.  Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric? , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[13]  Sunghyun Choi,et al.  Performance enhancement of multirate IEEE 802.11 WLANs with geographically scattered stations , 2006, IEEE Transactions on Mobile Computing.

[14]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[15]  Konstantina Papagiannaki,et al.  Interference Mitigation Through Power Control in High Density 802.11 WLANs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.

[18]  Kevin C. Almeroth,et al.  IQU: practical queue-based user association management for WLANs , 2006, MobiCom '06.

[19]  Marc Portoles-Comeras,et al.  IEEE 802.11 downlink traffic shaping scheme for multi-user service enhancement , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[20]  Paolo Bellavista,et al.  Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance Anomaly , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[21]  Konstantina Papagiannaki,et al.  Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[22]  Paolo Bellavista,et al.  The MUM Middleware to Counteract IEEE 802 . 11 Performance Anomaly in Context-aware Multimedia Provisioning , 2007 .

[23]  Sangki Yun,et al.  Resolving 802.11 performance anomalies through QoS differentiation , 2005, IEEE Communications Letters.

[24]  Dirk Grunwald,et al.  A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks , 2004, First International Conference on Broadband Networks.

[25]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).