Detection of jamming attacks in 802.11b wireless networks

The work in this paper is about to detect and classify jamming attacks in 802.11b wireless networks. The number of jamming detection and classification techniques has been proposed in the literature. Majority of them model individual parameters like signal strength, carrier sensing time, and packet delivery ratio to detect the presence of a jammer and to classify the jamming attacks. The demonstrated results by the authors are often overlapping as most of the jamming regions are closely marked, and they do not help to clearly distinguish different jamming mechanisms. We investigate a multi-modal scheme that models different jamming attacks by discovering the correlation between three parameters: packet delivery ratio, signal strength variation, and pulse width of the received signal. Based on that, profiles are generated in normal scenarios during training sessions which are then compared with test sessions to detect and classify jamming attacks. Our proposed model helps in clearly differentiating the jammed regions for various types of jamming attacks. In addition, it is equally effective for both the protocol-aware and protocol-unaware jammers. The reported results are not based on simulations, but a test-bed was established to experiment real scenarios demonstrating significant enhancements in previous results reported in the literature.

[1]  Sheldon M. Ross,et al.  Introduction to Probability Models (4th ed.). , 1990 .

[2]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[3]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[4]  MengChu Zhou,et al.  A new approach to detect radio jamming attacks in wireless networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[5]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[6]  Ilenia Tinnirello,et al.  Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[8]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[9]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[10]  Thanasis Korakis,et al.  An Experimental Study of Packet Loss and Forward Error Correction in Video Multicast over IEEE 802.11b Network , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[11]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[12]  Thanasis Korakis,et al.  Is Physical Layer Error Correction Sufficient for Video Multicast over IEEE 802.11g Networks? , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[13]  Elena López-Aguilera,et al.  Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs , 2010, IWCMC.

[14]  Nazar Abbas Saqib,et al.  Protocol aware shot-noise based radio frequency jamming method in 802.11 networks , 2011, 2011 Eighth International Conference on Wireless and Optical Communications Networks.

[15]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.

[16]  Xiaocheng Zou,et al.  Detection of Fabricated CTS Packet Attacks in Wireless LANs , 2010, QSHINE.