Performance of IEEE 802.11 under Jamming
نویسندگان
چکیده
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, including a reactive jammer that only jams noncolliding transmissions and an omniscient jammer that optimally adjusts its strategy according to current states of the participating nodes. Our study comprises of a theoretical analysis of the saturation throughput of 802.11 under jamming, an extensive simulation study, and a testbed to conduct real world experimentation of jamming IEEE 802.11 using a software defined radio (GNU Radio combined with USRP boards). In our theoretical analysis, we use a discrete-time Markov chain analysis to derive formula for the saturation throughput of 802.11 under memoryless, reactive and omniscient jamming. One of our key results is a characterization of optimal omniscient jamming that establishes a lower bound on the saturation throughput of 802.11 under arbitrary jammer attacks. We validate the theoretical analysis by means of Qualnet simulations. Finally, we measure the real-world performance of periodic, memoryless and reactive jammers using our GNURadio/USRP aided experimentation testbed. E. Bayraktaroglu · X. Liu · G. Noubir · R. Rajaraman · B.Thapa College of Computer & Information Science, Northeastern University, Boston MA E-mail: [email protected] C. King Department of Mathematics, Northeastern University, Boston MA E-mail: [email protected]
منابع مشابه
A Study of Jamming Attacks in IEEE 802.11 Networks
Security forms an important part of wireless network communication system. A variety of attacks can be performed on 802.11 MAC thereby compromising the security of the system and also leading to degradation of the system performance. The security attacks can be classified into different categories based on criteria nature of the attack, domain or attack techniques used. In this work we study th...
متن کاملSecurity Approaches in IEEE 802.11 MANET
Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resource...
متن کاملOn the Hidden Terminal Jamming Problem in IEEE 802.11 Mobile Ad Hoc Networks
This paper addresses recent experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the ‘hidden terminal jamming’ ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, ...
متن کاملA jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks
One critical issue in multihop ad hoc networks is the medium access control (MAC). The IEEE 802.11 MAC protocol is originally designed for fully connected, one-hop ad hoc networks but not for multihop ad hoc networks. In addition to the well known hidden-terminal problem, we found that IEEE 802.11 also suffers from an erroneous reservation problem which occurs when RTS-CTS exchange fails but th...
متن کاملHidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks
This paper addresses experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the `hidden terminal jamming' ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, the pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- MONET
دوره 18 شماره
صفحات -
تاریخ انتشار 2013