Jamming Wireless Networks: Attack and Defense Strategies - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Jamming Wireless Networks: Attack and Defense Strategies

Description:

Title: MBMS Security Framework QUALCOMM s proposal and our improvement Author: Wenyuan Last modified by: Vero Xu Created Date: 7/1/2003 2:37:12 PM – PowerPoint PPT presentation

Number of Views:600
Avg rating:3.0/5.0
Slides: 25
Provided by: Weny6
Category:

less

Transcript and Presenter's Notes

Title: Jamming Wireless Networks: Attack and Defense Strategies


1
Jamming Wireless Networks Attack and Defense
Strategies
  • Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang,
  • WINLAB, Rutgers University
  • Network/Computer Security Workshop
  • May 16th, 2006

2
Roadmap
  • Introduction and Motivation
  • Jammer Models
  • Four models
  • Their effectiveness
  • Detecting Jamming attacks
  • Basic statistic Consistency check
  • Defenses strategy
  • Channel surfing
  • Spatial retreat
  • Conclusions

3
Jammers
  • Jamming style DoS Attack
  • Behavior that prevents other nodes from using the
    channel to communicate by occupying the channel
    that they are communicating on
  • A jammer
  • An entity who is purposefully trying to interfere
    with the physical transmission and reception of
    wireless communications.
  • Is it hard to build a jammer?

4
Jammers Hardware
  • Cell phone jammer unit
  • Intended for blocking all mobile phone types
    within designated indoor areas
  • 'plug and play' unit
  • Waveform Generator
  • Tune frequency to what ever you want
  • MAC-layer Jammer (our focus)
  • Mica2 Motes (UC Berkeley)
  • 8-bit CPU at 4MHz,
  • 128KB flash, 4KB RAM
  • 916.7MHz radio
  • OS TinyOS
  • Disable the CSMA
  • Keep sending out the preamble

5
Jammers Hardware
  • Cell phone jammer unit
  • Intended for blocking all mobile phone types
    within designated indoor areas
  • 'plug and play' unit
  • Waveform Generator
  • Tune frequency to what ever you want
  • MAC-layer Jammer (our focus)
  • Mica2 Motes (UC Berkeley)
  • 8-bit CPU at 4MHz,
  • 128KB flash, 4KB RAM
  • 916.7MHz radio
  • OS TinyOS
  • Disable the CSMA
  • Keep sending out the preamble

6
Jammers Hardware
  • Cell phone jammer unit
  • Intended for blocking all mobile phone types
    within designated indoor areas
  • 'plug and play' unit
  • Waveform Generator
  • Tune frequency to what ever you want
  • MAC-layer Jammer
  • 802.11 laptop
  • Mica2 Motes (UC Berkeley)
  • 8-bit CPU at 4MHz,
  • 128KB flash, 4KB RAM
  • 916.7MHz radio
  • OS TinyOS
  • Disable the CSMA
  • Keep sending out the preamble

7
The Jammer Models and Their Effectiveness
8
Jammer Attack Models
  • Constant jammer
  • Continuously emits a radio signal
  • Deceptive jammer
  • Constantly injects regular packets to the channel
    without any gap between consecutive packet
    transmissions
  • A normal communicator will be deceived into the
    receive state

9
Jammer Attack Models
  • Random jammer
  • Alternates between sleeping and jamming
  • Sleeping period turn off the radio
  • Jamming period either a constant jammer or
    deceptive jammer
  • Reactive jammer
  • Stays quiet when the channel is idle, starts
    transmitting a radio signal as soon as it senses
    activity on the channel.
  • Targets the reception of a message

10
Detecting Jamming Attacks Basic Statistics plus
Consistency Checks
11
Basic Statistics
P.1
  • Idea
  • Many measurement will be affected by the presence
    of a jammer
  • Network devices can gather measurements during a
    time period prior to jamming and build a
    statistical model describing basic measurement in
    the network
  • Measurement
  • Signal strength
  • Moving average
  • Spectral discrimination
  • Carrier sensing time
  • Packet delivery ratio
  • Experiment platform
  • Mica2 Motes
  • Use RSSI ADC to
  • measure the signal
  • strength

12
Basic Statistics
P.2
  • Can basic statistics differentiate between
    jamming scenario from a normal scenario including
    congestion?
  • Differentiate jamming scenario from all network
    dynamics, e.g. congestion, hardware failure
  • PDR is a relative good statistic, but cannot do
    hardware failure
  • Consistency checks --- using Signal strength
  • Normal scenarios
  • High signal strength ? a high PDR
  • Low signal strength ? a low PDR
  • Low PDR
  • Hardware failure or poor link quality ? low
    signal strength
  • Jamming attack ? high signal strength

Signal strength Signal strength Carrier sensing time Packet delivery ratio
Average Spectral Discrimination Carrier sensing time Packet delivery ratio
Constant Jammer
Deceptive Jammer
Random Jammer
Reactive Jammer
13
Jamming Detection with Consistency Checks
  • Build a (PDR,SS) look-up table empirically
  • Measure (PDR, SS) during a guaranteed time of
    non-interfered network.
  • Divide the data into PDR bins, calculate the mean
    and variance for the data within each bin.
  • Get the upper bound for the maximum SS that world
    have produced a particular PDR value during a
    normal case.
  • Partition the (PDR, SS) plane into a
    jammed-region and a non-jammed region.

14
Defenses against Jamming Attacks Channel Surfing
and Spatial Retreat
15
Handling Jamming Strategies
  • What can you do when your channel is occupied?
  • In wired network you can cut the link that causes
    the problem, but in wireless
  • Make the building as resistant as possible to
    incoming radio signals?
  • Find the jamming source and shoot it down?
  • Battery drain defenses/attacks are not realistic!
  • Protecting networks is a constant battle between
    the security expert and the clever adversary.
  • Therefore, we take motivation from The Art of
    War by Sun Tze
  • He who cannot defeat his enemy should retreat.
  • Retreat Strategies
  • Channel Surfing
  • Spatial retreat

16
Channel Surfing
  • Idea
  • If we are blocked at a particular channel, we can
    resume our communication by switching to a safe
    channel
  • Inspired by frequency hopping techniques, but
    operates at the link layer in an on-demand
    fashion.
  • Challenge
  • Distributed computing, scheduling
  • Asynchrony, latency and scalability

Node working in channel 1
channel 1
Node working in channel 2
channel 2
17
Channel Surfing
  • Coordinated Channel Switching
  • The entire network changes its channel to a new
    channel
  • Spectral Multiplexing
  • Jammed node switch channel
  • Nodes on the boundary of a jammed region serve as
    relay nodes between different spectral zones

Coordinated channel surfing
channel 1
channel 2
18
Channel Surfing
  • Coordinated Channel Switching
  • The entire network changes its channel to a new
    channel
  • Spectral Multiplexing
  • Jammed node switch channel
  • Nodes on the boundary of a jammed region serve as
    relay nodes between different spectral zones

Spectral Multiplexing
channel 1
channel 2
19
Channel Surfing Experiment Verification
  • Setup
  • 30 Mica2 motes (916MHz)
  • Indoor environment
  • Data rate 1 packet/10sec
  • Routing shortest path routing
  • Jammer Constant jammer
  • Metrics
  • Ability to repair network gt latency required to
    restore connectivity
  • Protocol overhead gt of channel switch

20
Channel Surfing- results
  • Coordinated channel switching
  • Broadcast-assistant switching
  • Switching latency 232.9 seconds
  • Maximum number of channel switches among all
    nodes 3
  • Spectral Multiplexing
  • Synchronous asynchronous spectral multiplexing
  • The network work can resume its connectivity
    within comparable amount of time

21
Spatial Retreat
  • Targeted NetworksNodes in the network should
    have
  • Mobility
  • GPS or similar localization
  • Idea
  • Nodes that are located within the jammed area
    move to safe regions.
  • Escaping
  • Choose a random direction to evacuate from jammed
    area
  • If no nodes are within its radio range, it moves
    along the boundary of the jammed area until it
    reconnects to the rest of the network.

C
D
B
E
F
H
G
I
22
Spatial Retreat
  • Issues
  • A mobile adversary can move through the network
  • The network can be partitioned
  • After Escape Phase we need Reconstruction phase
    to repair the network
  • Reconstruction phaseVirtual force Model
  • Forces only exist between neighboring sensors
  • Forces are either repulsive or attractive
  • Forces represent a need for sensors to move in
    order to improve system behavior
  • virtual force is calculated based on its distance
    to all its neighboring sensors
  • Direct its movement according to its force
  • When all sensors stop moving, the spatial
    coverage of the whole network is maximized

Borrowed from Ke Ma
23
Case Study Spatial Retreats
Borrowed from Ke Ma
24
Conclusion
  • Due to the shared nature of the wireless medium,
    it is an easy feat for adversaries to perform a
    jamming-style denial of service against wireless
    networks
  • We proposed to use consistency check based on PDR
    to detect jammers
  • We have presented two different strategies to
    defend against the jamming style of DoS attacks
  • Channel-surfing changing the transmission
    frequency to a range where there is no
    interference from the adversary
  • Spatial retreat moving to a new location where
    there is no interference
Write a Comment
User Comments (0)
About PowerShow.com