SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers

In wireless networks, users share a transmission medium. For efficient channel use, wireless systems often use a Medium Access Control (MAC) protocol to perform channel coordination by having each node announce its usage intentions and other nodes avoid making conflicting transmissions. Traditionally, such announcements are made on a common control channel. However, this control channel is vulnerable to jamming because its location is pre-assigned and known to attackers. Furthermore, the announcements themselves provide information useful for jamming. We focus on a situation where transmitters share spectrum in the presence of intelligent and insider jammers capable of adaptively changing their jamming patterns. Despite the complex threat model, we propose a simple MAC scheme, called SimpleMAC, that effectively counters network compromise and MAC-aware jamming attacks. We then study the optimal adversarial behavior and analyze the performance of the proposed scheme theoretically, through Monte Carlo simulations, and by implementation on the WARP software-defined radio platform. In comparison to the Nash equilibrium alternative of disabling the MAC protocol, SimpleMAC quickly attains vastly improved performance and converges to the optimal solution (over six-fold improvement in SINR and 50% gains in channel capacity in a realistic mobile scenario).

[1]  Yih-Chun Hu,et al.  Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming , 2013, MobiWac '13.

[2]  Devavrat Shah,et al.  Spinal codes , 2012, CCRV.

[3]  Koorosh Firouzbakht,et al.  On the capacity of rate-adaptive packetized wireless communication links under jamming , 2012, WISEC '12.

[4]  Christian Scheideler,et al.  A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.

[5]  Ian D. Marsland,et al.  A Comparison of Rateless Codes at Short Block Lengths , 2008, 2008 IEEE International Conference on Communications.

[6]  Yih-Chun Hu,et al.  Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[7]  Robert Simon,et al.  A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.

[8]  John S. Baras,et al.  Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[10]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Ashutosh Sabharwal,et al.  Design of WARP: A wireless open-access research platform , 2006, 2006 14th European Signal Processing Conference.

[12]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[13]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[14]  S. T. Chung,et al.  A game-theoretic approach to power allocation in frequency-selective gaussian interference channels , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[15]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[16]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[17]  A. M. Murray Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[18]  Vijay K. Bhargava,et al.  Unified error analysis of DQPSK in fading channels , 1994 .

[19]  Marvin K. Simon,et al.  Spread Spectrum Communications Handbook , 1994 .

[20]  T. Tjhung,et al.  BER performance of DQPSK in slow Rician fading , 1992 .

[21]  L. M. Jones Organization of physics education at a Large American State University (The University of Illinois at Urbana-Champaign(UIUC)) , 1989 .

[22]  Tamer Basar,et al.  With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .

[23]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[24]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.