Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Understanding and mitigating the impact of RF interference on 802.11 networks

Published: 27 August 2007 Publication History

Abstract

We study the impact on 802.11 networks of RF interference from devices such as Zigbee and cordless phones that increasingly crowd the 2.4GHz ISM band, and from devices such as wireless camera jammers and non-compliant 802.11 devices that seek to disrupt 802.11 operation. Our experiments show that commodity 802.11 equipment is surprisingly vulnerable to certain patterns of weak or narrow-band interference. This enables us to disrupt a link with an interfering signal whose power is 1000 times weaker than the victim's 802.11 signals, or to shut down a multiple AP, multiple channel managed network at a location with a single radio interferer. We identify several factors that lead to these vulnerabilities, ranging from MAC layer driver implementation strategies to PHY layer radio frequency implementation strategies. Our results further show that these factors are not overcome by simply changing 802.11 operational parameters (such as CCA threshold, rate and packet size) with the exception of frequency shifts. This leads us to explore rapid channel hopping as a strategy to withstand RF interference. We prototype a channel hopping design using PRISM NICs, and find that it can sustain throughput at levels of RF interference well above that needed to disrupt unmodified links, and at a reasonable cost in terms of switching overheads.

References

[1]
A brief tutorial on the PHY and MAC layers of the IEEE 802.11b Standard, http://tinyurl.com/2d6f48.
[2]
A comparison of frequency hopping and direct sequence spread spectrum modulation for IEEE 802.11 applications at 2.4 GHz, http://www.sss-mag.com/pdf/ds-v-fh.pdf.
[3]
A. Akella, G. Judd, S. Seshan, and P. Steenkiste. Self management in chaotic wireless deployments. In MobiCom '05.
[4]
ANT personal area networks, http://www.thisisant.com/.
[5]
P. Bahl, R. Chandra, and J. Dunagan. SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks. In MobiCom '04.
[6]
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Usenix Security 2003.
[7]
Bluetooth coexistence with 802.11, http://tinyurl.com/2grndv.
[8]
CC2420 Data Sheet, http://tinyurl.com/ytut3k.
[9]
CC2500 Data Sheet, http://tinyurl.com/7xfhm.
[10]
Citywide wireless broadband projects around the world, http://www.muniwireless.com/.
[11]
Denial of Service Vulnerability in IEEE 802.11 Wireless Devices, http://tinyurl.com/26x94r.
[12]
J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye. Feasibility study of mesh networks for all-wireless offices. In MobiSys 2006.
[13]
F. Ferreri, M. Bernaschi, and L. Valcamonici. Access points vulnerabilities to DoS attacks in 802.11 networks. In WCNC 2004.
[14]
S. Glass and V. Muthukkumarasamy. 802.11 DCF denial of service vulnerabilities. In 3rd Australian Computer, Network & Information Forensics Conference.
[15]
HFA3683A RF Front-End Data Sheet, http://tinyurl.com/24yxml.
[16]
HFA3863 Baseband Processor Data Sheet, http://tinyurl.com/22tkwt.
[17]
K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu. Impact of interference on multi-hop wireless network performance. In MobiCom '03.
[18]
T. Karhima, A. Silvennoinen, M. Hall, and S.-G. Haggman. IEEE 802.11 b/g wlan tolerance to jamming. In MILCOM 2004.
[19]
M. Kodialam and T. Nandagopal. Characterizing achievable rates in multi-hop wireless networks: the joint routing and scheduling problem. In MobiCom '03.
[20]
M. Lacage and T. Henderson. Yet Another Network Simulator. In WNS2'06: Proc. of the 2006 workshop on ns-2.
[21]
A. Mishra, V. Shrivastava, D. Agrawal, S. Banerjee, and S. Ganguly. Distributed channel management in uncoordinated wireless environments. In MobiCom'06.
[22]
A. Mishra, V. Shrivastava, S. Banerjee, and W. Arbaugh. Partially overlapped channels not considered harmful. In SIGMETRICS '06.
[23]
V. Navda, A. Bohra, S. Ganguly, R. Izmailov, and D. Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE Infocom Minisymposium, May 2007.
[24]
J. Park, D. kim, C. Kang, and D. Hong. Effect of partial band jamming on ofdm-based wlan in 802.11g. In ICASSP 2003.
[25]
PRISM Driver Programmer's Manual, http://tinyurl.com/yrqh27.
[26]
Quick guide to IEEE 802.11 WG activities, http://tinyurl.com/ypojvc.
[27]
T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR.
[28]
The Stargate platform, http://tinyurl.com/2bld2v.
[29]
Wii interference with 802.11, http://tinyurl.com/y4gyvv.
[30]
Wireless camera jammer for privacy, http://tinyurl.com/2esyv4.
[31]
WirelessUSB from Cypress Semiconductors, http://tinyurl.com/ywjo8s.

Cited By

View all
  • (2024)Adaptive Whitening and Feature Gradient Smoothing-Based Anti-Sample Attack Method for Modulated Signals in Frequency-Hopping CommunicationElectronics10.3390/electronics1309178413:9(1784)Online publication date: 5-May-2024
  • (2024)Interference Effects on Bandwidth Availability for UAV Communications2024 Integrated Communications, Navigation and Surveillance Conference (ICNS)10.1109/ICNS60906.2024.10550835(1-6)Online publication date: 23-Apr-2024
  • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-w18:3(225-247)Online publication date: 1-Sep-2024
  • Show More Cited By

Index Terms

  1. Understanding and mitigating the impact of RF interference on 802.11 networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
        October 2007
        420 pages
        ISSN:0146-4833
        DOI:10.1145/1282427
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2007
          432 pages
          ISBN:9781595937131
          DOI:10.1145/1282380
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 27 August 2007
        Published in SIGCOMM-CCR Volume 37, Issue 4

        Check for updates

        Author Tags

        1. 802.11
        2. RF interference
        3. SINR
        4. channel hopping
        5. jamming

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)168
        • Downloads (Last 6 weeks)21
        Reflects downloads up to 24 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Adaptive Whitening and Feature Gradient Smoothing-Based Anti-Sample Attack Method for Modulated Signals in Frequency-Hopping CommunicationElectronics10.3390/electronics1309178413:9(1784)Online publication date: 5-May-2024
        • (2024)Interference Effects on Bandwidth Availability for UAV Communications2024 Integrated Communications, Navigation and Surveillance Conference (ICNS)10.1109/ICNS60906.2024.10550835(1-6)Online publication date: 23-Apr-2024
        • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-w18:3(225-247)Online publication date: 1-Sep-2024
        • (2023)A Three-Tier Deep Learning-Based Channel Access Method for WiFi NetworksIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2023.32880901(90-106)Online publication date: 2023
        • (2023)A Hierarchical Deep Learning Approach for Optimizing CCA Threshold and Transmit Power in Wi-Fi NetworksIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.32829849:5(1296-1307)Online publication date: Oct-2023
        • (2023)Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine LearningMILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM58377.2023.10356126(919-924)Online publication date: 30-Oct-2023
        • (2022)On the Security of the Wireless Electric Vehicle Charging Communication2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)10.1109/SmartGridComm52983.2022.9961000(393-398)Online publication date: 25-Oct-2022
        • (2022)Comparison of Contention-Based vs Timeslotted Channel Hopping Medium Access in Wireless Sensor Networks under Noisy Environment2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ITNAC55475.2022.9998416(7-12)Online publication date: 30-Nov-2022
        • (2022)RetroFlex: enabling intuitive human–robot collaboration with flexible retroreflective tagsCCF Transactions on Pervasive Computing and Interaction10.1007/s42486-022-00120-74:4(437-451)Online publication date: 28-Nov-2022
        • (2020)Interference Mapping in 3D for High-Density Indoor IoT DeploymentsWireless Sensor Networks - Design, Deployment and Applications [Working Title]10.5772/intechopen.93581Online publication date: 10-Sep-2020
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media