Understanding and mitigating the impact of RF interference on 802.11 networks

We study the impact on 802.11 networks of RF interference from devices such as Zigbee and cordless phones that increasingly crowd the 2.4GHz ISM band, and from devices such as wireless camera jammers and non-compliant 802.11 devices that seek to disrupt 802.11 operation. Our experiments show that commodity 802.11 equipment is surprisingly vulnerable to certain patterns of weak or narrow-band interference. This enables us to disrupt a link with an interfering signal whose power is 1000 times weaker than the victim's 802.11 signals, or to shut down a multiple AP, multiple channel managed network at a location with a single radio interferer. We identify several factors that lead to these vulnerabilities, ranging from MAC layer driver implementation strategies to PHY layer radio frequency implementation strategies. Our results further show that these factors are not overcome by simply changing 802.11 operational parameters (such as CCA threshold, rate and packet size) with the exception of frequency shifts. This leads us to explore rapid channel hopping as a strategy to withstand RF interference. We prototype a channel hopping design using PRISM NICs, and find that it can sustain throughput at levels of RF interference well above that needed to disrupt unmodified links, and at a reasonable cost in terms of switching overheads.

[1]  Benjamin E. Henty,et al.  A Brief Tutorial on the PHY and MAC layers of the IEEE 802.11b Standard , 2001 .

[2]  Dongkyu Kim,et al.  Effect of partial band jamming on OFDM-based WLAN in 802.11g , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[3]  Vallipuram Muthukkumarasamy,et al.  802.11 DCF Denial of Service Vulnerabilities , 2005, Australian Computer, Network & Information Forensics Conference.

[4]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[5]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2005, Wirel. Networks.

[6]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[7]  Paramvir Bahl,et al.  Feasibility study of mesh networks for all-wireless offices , 2006, MobiSys '06.

[8]  Mathieu Lacage,et al.  Yet another network simulator , 2006 .

[9]  T. Karhima,et al.  IEEE 802.11b/g WLAN tolerance to jamming , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[10]  Carl Andren,et al.  A Comparison of Frequency Hopping and Direct Sequence Spread Spectrum Modulation for IEEE 802.11 Applications at 2.4 GHz , 1997 .

[11]  P. Bahl,et al.  SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks , 2004, MobiCom '04.

[12]  Suman Banerjee,et al.  Distributed channel management in uncoordinated wireless environments , 2006, MobiCom '06.

[13]  William A. Arbaugh,et al.  Partially overlapped channels not considered harmful , 2006, SIGMETRICS '06/Performance '06.

[14]  Srinivasan Seshan,et al.  Self-management in chaotic wireless deployments , 2005, MobiCom '05.

[15]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[16]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.

[17]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[18]  Murali S. Kodialam,et al.  Characterizing achievable rates in multi-hop wireless networks: the joint routing and scheduling problem , 2003, MobiCom '03.