Abstract
Wireless local area networks(WLANs) work upon a shared medium and broadcast data frames via radio waves. These features let legitimate users connect to Internet conveniently at WLAN access points but also let a malicious attacker misuse network flexibly. Attackers can launch jamming attacks by exploiting vulnerabilities in 802.11, which is a dominant protocol used by WLAN. We discuss two jamming attacks, RTS and CTS jamming, and address their attacking conditions and threats. To defend against jamming attacks, a CUSUM based detection method is proposed, which can accurately detect jamming attacks with little computation and storage cost. When continuous attacking packets are sent out, a change-point will appear in a traffic sequence. Our detection method is capable to observe such change-points and then launch alarms. The efficiency of defense methods is verified by simulation results.
This work is supported by the National Natural Science Foundation of China(Science Department Special Dean Foundation) under Grant No. 60642006 and by China NJUPT Climbing Project Foundation NY206077.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hubaux, J.P., Butty, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc 2001), pp. 146–155. ACM Press, New York (2001)
Butty, L., Hubaux, J.P.: Report on a working session on security in wireless ad hoc networks. SIGMOBILE Mobile Computing and Communications Review 7, 74–94 (2003)
Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC, pp. 15–28 (2003)
Brodsky, B.: Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, Netherlands (1993)
Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proceedings of MILCOM 2002. vol. 2, pp. 1118–1123 (2002)
Housley, R., Arbaugh, W.: Security problems in 802.11-based networks. Communications of ACM 46, 31–34 (2003)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. ACM Press, New York (2005)
Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of the 10th annual international conference on Mobile computing and networking (MobiCom 2004), pp. 202–215. ACM Press, New York (2004)
McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of 2005 IEEE Symposium on Security and Privacy, pp. 64–78 (2005)
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceeding of 2004 ACM workshop on Wireless security, pp. 80–89 (2004)
Raya, M., Hubaux, J.P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys 2004), pp. 84–97. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, W., Chen, D., Sun, G., Zhang, Y. (2007). Defending Against Jamming Attacks in Wireless Local Area Networks. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_53
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)