Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks

Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference to a limited extent; they are especially vulnerable to a reactive jammer i.e., a jammer that injects noise upon sensing a legitimate transmission or wideband jamming. In this paper, we leverage the inherent features of OFDM (Orthogonal Frequency Division Multiplexing) to cope with such attacks. Specifically, via extensive experiments, we observe that the jamming signal experiences differing levels of fading across the composite sub-carriers in its transmission bandwidth. Thus, if the legitimate transmitter were to somehow exploit the relatively unaffected sub-carriers to transmit data to the receiver, it could achieve reasonable throughputs, even in the presence of the active jammer. We design and implement JIMS, a Jamming Interference Mitigation Scheme that exploits the above characteristic by overcoming key practical challenges. Via extensive testbed experiments and simulations we show that JIMS achieves a throughput restoration of up to 75 percent in the presence of an active jammer.

[1]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[2]  Waqar Mahmood,et al.  An energy-efficient anti-jam cognitive system for wireless OFDM communication , 2014, Int. J. Commun. Syst..

[3]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  David Starobinski,et al.  Rate adaptation in unlicensed bands under smart jamming attacks , 2012, 2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).

[5]  Srikanth V. Krishnamurthy,et al.  ARES: an anti-jamming reinforcement system for 802.11 networks , 2009, CoNEXT '09.

[6]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[7]  Sarvar Patel,et al.  Password-Authenticated Key (PAK) Diffie-Hellman Exchange , 2010, RFC.

[8]  Jeffrey H. Reed,et al.  PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.

[9]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[10]  Dongkyu Kim,et al.  Effect of partial band jamming on OFDM-based WLAN in 802.11g , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[11]  Hikmet Sari,et al.  An analysis of orthogonal frequency-division multiple access , 1997, GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record.

[12]  Hyuk Lim,et al.  Improving spatial reuse through tuning transmit power, carrier sense threshold, and data rate in multihop wireless networks , 2006, MobiCom '06.

[13]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design: Anderson/Fixed , 2003 .

[14]  T. Charles Clancy,et al.  Efficient OFDM Denial: Pilot Jamming and Pilot Nulling , 2011, 2011 IEEE International Conference on Communications (ICC).

[15]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[16]  Bo Sheng,et al.  On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming , 2011, WiSec '11.

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[18]  Ye Li,et al.  Anti-jamming property of clustered OFDM for dispersive channels , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[19]  Keith Q. T. Zhang,et al.  Efficient Estimation of Fast Fading OFDM Channels , 2006, 2006 IEEE International Conference on Communications.

[20]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[21]  Jun Luo,et al.  Bit Error Rate Analysis of jamming for OFDM systems , 2007, 2007 Wireless Telecommunications Symposium.

[22]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design: The Creation of Global Mobile Communications , 2003 .

[23]  John M. Shea,et al.  Energy-efficient jamming attack in IEEE 802.11 MAC , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[24]  Thomas Stockhammer,et al.  Raptor Forward Error Correction Scheme for Object Delivery , 2007, RFC.

[25]  Ioannis Broustis,et al.  IBAKE: Identity-Based Authenticated Key Exchange , 2012, RFC.

[26]  Srikanth V. Krishnamurthy,et al.  Mitigating malicious interference via subcarrier-level radio agility in wireless networks , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[27]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[28]  Mika Ståhlberg Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .

[29]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .