Performance of IEEE 802.11 under Jamming

نویسندگان

  • Emrah Bayraktaroglu
  • Christopher King
  • Xin Liu
  • Guevara Noubir
  • Rajmohan Rajaraman
  • Bishal Thapa
چکیده

We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, including a reactive jammer that only jams noncolliding transmissions and an omniscient jammer that optimally adjusts its strategy according to current states of the participating nodes. Our study comprises of a theoretical analysis of the saturation throughput of 802.11 under jamming, an extensive simulation study, and a testbed to conduct real world experimentation of jamming IEEE 802.11 using a software defined radio (GNU Radio combined with USRP boards). In our theoretical analysis, we use a discrete-time Markov chain analysis to derive formula for the saturation throughput of 802.11 under memoryless, reactive and omniscient jamming. One of our key results is a characterization of optimal omniscient jamming that establishes a lower bound on the saturation throughput of 802.11 under arbitrary jammer attacks. We validate the theoretical analysis by means of Qualnet simulations. Finally, we measure the real-world performance of periodic, memoryless and reactive jammers using our GNURadio/USRP aided experimentation testbed. E. Bayraktaroglu · X. Liu · G. Noubir · R. Rajaraman · B.Thapa College of Computer & Information Science, Northeastern University, Boston MA E-mail: [email protected] C. King Department of Mathematics, Northeastern University, Boston MA E-mail: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study of Jamming Attacks in IEEE 802.11 Networks

Security forms an important part of wireless network communication system. A variety of attacks can be performed on 802.11 MAC thereby compromising the security of the system and also leading to degradation of the system performance. The security attacks can be classified into different categories based on criteria nature of the attack, domain or attack techniques used. In this work we study th...

متن کامل

Security Approaches in IEEE 802.11 MANET

Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resource...

متن کامل

On the Hidden Terminal Jamming Problem in IEEE 802.11 Mobile Ad Hoc Networks

This paper addresses recent experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the ‘hidden terminal jamming’ ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, ...

متن کامل

A jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks

One critical issue in multihop ad hoc networks is the medium access control (MAC). The IEEE 802.11 MAC protocol is originally designed for fully connected, one-hop ad hoc networks but not for multihop ad hoc networks. In addition to the well known hidden-terminal problem, we found that IEEE 802.11 also suffers from an erroneous reservation problem which occurs when RTS-CTS exchange fails but th...

متن کامل

Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks

This paper addresses experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the `hidden terminal jamming' ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, the pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • MONET

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2013