Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
- 1 January 2007
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 0743166X,p. 2526-2530
- https://doi.org/10.1109/infcom.2007.314
Abstract
802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we explore how to protect 802.11 networks from jamming attacks by having the legitimate transmission hop among channels to hide the transmission from the jammer. Using a combination of mathematical analysis and prototype experimentation in an 802.11a environment, we explore how much throughput can be maintained in comparison to the maintainable throughput in a cooperative, jam-free environment. Our experimental and analytical results show that in today's conventional 802.11a networks, we can achieve up to 60% of the original throughput. Our mathematical analysis allows us to extrapolate the throughput that can be maintained when the constraint on the number of orthogonal channels used for both legitimate communication and for jamming is relaxed.Keywords
This publication has 9 references indexed in Scilit:
- Selfish MAC layer misbehavior in wireless networksIEEE Transactions on Mobile Computing, 2005
- The feasibility of launching and detecting jamming attacks in wireless networksPublished by Association for Computing Machinery (ACM) ,2005
- Sniffing out the correct physical layer capture model in 802.11bPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Channel surfing and spatial retreatsPublished by Association for Computing Machinery (ACM) ,2004
- DOMINOPublished by Association for Computing Machinery (ACM) ,2004
- The status and future of 802.11 based WLANsComputer, 2003
- Probability of capture and rejection of primary multiple-access interference in spread-spectrum networksIEEE Transactions on Communications, 1991
- On the generation of cryptographically strong pseudorandom sequencesACM Transactions on Computer Systems, 1983
- Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone SolutionIEEE Transactions on Communications, 1975