Using channel hopping to increase 802.11 resilience to jamming attacks

被引:128
作者
Navda, Vishnu [1 ]
Bohra, Aniruddha [1 ]
Ganguly, Samrat [1 ]
Rubenstein, Dan [2 ]
机构
[1] NEC Labs Amer, Princeton, NJ 08540 USA
[2] Columbia Univ, Columbia, MO 10027 USA
来源
INFOCOM 2007, VOLS 1-5 | 2007年
关键词
D O I
10.1109/INFCOM.2007.314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we explore how to protect 802.11 networks from jamming attacks by having the legitimate transmission hop among channels to hide the transmission from the jammer. Using a combination of mathematical analysis and prototype experimentation in an 802.11a environment, we explore how much throughput can be maintained in comparison to the maintainable throughput in a cooperative, jam-free environment. Our experimental and analytical results show that in today's conventional 802.11a networks, we can achieve up to 60% of the original throughput. Our mathematical analysis allows us to extrapolate the throughput that can be maintained when the constraint on the number of orthogonal channels used for both legitimate communication and for jamming is relaxed.
引用
收藏
页码:2526 / +
页数:2
相关论文
共 50 条
[11]   Jamming -Resilient Channel Hopping for WirelessHART Networks [J].
Permatasari, Elisabeth ;
Saifullah, Abusayeed ;
Zhang, Haibo .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING 2025, ICDCN 2025, 2024, :56-65
[12]   Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit [J].
Odeyomi, Olusola T. .
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, :207-212
[13]   Detection of jamming attacks in 802.11b wireless networks [J].
Sufyan, Nadeem ;
Saqib, Nazar Abbass ;
Zia, Muhammad .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
[14]   Detection of jamming attacks in 802.11b wireless networks [J].
Nadeem Sufyan ;
Nazar Abbass Saqib ;
Muhammad Zia .
EURASIP Journal on Wireless Communications and Networking, 2013
[15]   Resilience of LTE Networks Against Smart Jamming Attacks [J].
Aziz, Farhan M. ;
Shamma, Jeff S. ;
Stueber, Gordon L. .
2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, :734-739
[16]   LoRaWAN Performance Evaluation and Resilience under Jamming Attacks [J].
Kalokidou, Vaia ;
Nair, Manish ;
Beach, Mark A. .
2022 SENSOR SIGNAL PROCESSING FOR DEFENCE CONFERENCE, SSPD, 2022, :101-105
[17]   A Frequency Hopping Algorithm against Jamming Attacks under Asynchronous Environments [J].
Chang, Guey-Yun ;
Huang, Jen-Feng ;
Wu, Zheng-Hua .
2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, :324-329
[18]   Mitigating jamming attacks in mobile cognitive networks through time hopping [J].
Adem, Nadia ;
Hamdaoui, Bechir ;
Yavuz, Attila .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (17) :3004-3014
[19]   Jamming Attacks in 802.11g-a Cognitive Radio Based Approach [J].
Prasad, Sudarshan ;
Thuente, David J. .
2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, :1219-1224
[20]   Sequence Sensing Jamming Attacks against Modular-Based Channel Hopping Rendezvous Algorithms for Cognitive Ratio Networks [J].
Oh, Young-Hyun ;
Thuente, David J. .
2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,