Nothing Special   »   [go: up one dir, main page]

Skip to main content

Defending Against Jamming Attacks in Wireless Local Area Networks

  • Conference paper
Autonomic and Trusted Computing (ATC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Included in the following conference series:

Abstract

Wireless local area networks(WLANs) work upon a shared medium and broadcast data frames via radio waves. These features let legitimate users connect to Internet conveniently at WLAN access points but also let a malicious attacker misuse network flexibly. Attackers can launch jamming attacks by exploiting vulnerabilities in 802.11, which is a dominant protocol used by WLAN. We discuss two jamming attacks, RTS and CTS jamming, and address their attacking conditions and threats. To defend against jamming attacks, a CUSUM based detection method is proposed, which can accurately detect jamming attacks with little computation and storage cost. When continuous attacking packets are sent out, a change-point will appear in a traffic sequence. Our detection method is capable to observe such change-points and then launch alarms. The efficiency of defense methods is verified by simulation results.

This work is supported by the National Natural Science Foundation of China(Science Department Special Dean Foundation) under Grant No. 60642006 and by China NJUPT Climbing Project Foundation NY206077.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hubaux, J.P., Butty, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc 2001), pp. 146–155. ACM Press, New York (2001)

    Chapter  Google Scholar 

  2. Butty, L., Hubaux, J.P.: Report on a working session on security in wireless ad hoc networks. SIGMOBILE Mobile Computing and Communications Review 7, 74–94 (2003)

    Article  Google Scholar 

  3. Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC, pp. 15–28 (2003)

    Google Scholar 

  4. Brodsky, B.: Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, Netherlands (1993)

    Google Scholar 

  5. Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proceedings of MILCOM 2002. vol. 2, pp. 1118–1123 (2002)

    Google Scholar 

  6. Housley, R., Arbaugh, W.: Security problems in 802.11-based networks. Communications of ACM 46, 31–34 (2003)

    Article  Google Scholar 

  7. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. ACM Press, New York (2005)

    Chapter  Google Scholar 

  8. Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of the 10th annual international conference on Mobile computing and networking (MobiCom 2004), pp. 202–215. ACM Press, New York (2004)

    Chapter  Google Scholar 

  9. McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of 2005 IEEE Symposium on Security and Privacy, pp. 64–78 (2005)

    Google Scholar 

  10. Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceeding of 2004 ACM workshop on Wireless security, pp. 80–89 (2004)

    Google Scholar 

  11. Raya, M., Hubaux, J.P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys 2004), pp. 84–97. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, W., Chen, D., Sun, G., Zhang, Y. (2007). Defending Against Jamming Attacks in Wireless Local Area Networks. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics