Jamming ACK Attack to Wireless Networks and a Mitigation Approach

被引:5
作者
Zhang, Zhiguo [1 ]
Wu, Jingqi [1 ]
Deng, Jing [2 ]
Qiu, Meikang [3 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
[2] Univ N Carolina, Dept Comp Sci, Greensboro, NC 27402 USA
[3] Univ New Orleans, Dept Elect Engn, New Orleans, LA 70148 USA
来源
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE | 2008年
关键词
D O I
10.1109/GLOCOM.2008.ECP.950
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the successful reception of the data packet. Such a protocol requirement may become a system weakness when malicious nodes attack these wireless networks. In this paper, we demonstrate the effects of such a Jamming ACK (JACK) attack to networks employing the popular Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme in IEEE 802.11 DCF. Our study shows that a JACK attacker can easily disrupt the traffic flow between two wireless nodes when it sends out JACK packets at the right time. The benefits of such a JACK attack include low energy consumption by the attacker, attack stealthiness, and great damage to the victim nodes. To mitigate the effects of JACK attacks, we propose in this paper an Extended Network Allocation Vector (ENAV) scheme. Our analysis and simulations show that the ENAV scheme recovers a significant portion of the lost throughput and reduces the energy drainage of the attacked nodes to 40%.
引用
收藏
页数:5
相关论文
共 10 条
[1]  
ACHARYA M, 2004, PORC OPNETWORK 2004
[2]  
Akhtar Suhail, 2005, CRIM REP, V26, P46
[3]  
BELLARDO J, 2003, P 12 USENIX SEC S AU
[4]  
CHEN D, 2003, ACM MOBICOM 03 POST
[5]  
Feeney LM, 2001, IEEE INFOCOM SER, P1548, DOI 10.1109/INFCOM.2001.916651
[6]  
GUPTA V, 2002, P MILCOM 02 OCT
[7]   Detection and handling of MAC layer misbehavior in wireless networks [J].
Kyasanur, P ;
Vaidya, NH .
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :173-182
[8]  
STAJANO F, 1999, SECURITY PROTOCOLS
[9]   Security in mobile ad hoc networks: Challenges and solutions [J].
Yang, H ;
Luo, HY ;
Ye, F ;
Lu, SW ;
Zhang, LX .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :38-47
[10]  
ZHOU LD, 1999, IEEE NETWORK MAG NOV, V13