2005
DOI: 10.1002/wcm.221
|View full text |Cite
|
Sign up to set email alerts
|

On link layer denial of service in data wireless LANs

Abstract: In this paper, we investigate the resiliency to jamming of data protocols, such as IP, over WLAN. We show that, on existing WLAN, an adversary can successfully jam data packets at a very low energy cost. Such attacks allow a set of adversary nodes disseminated over an area to prevent communication, partition an ad hoc network or force packets to be routed over adversary chosen paths. The ratio of the jamming pulses duration to the transmission duration can be as low as 10−4. We investigate and analyze the perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(89 citation statements)
references
References 8 publications
0
89
0
Order By: Relevance
“…5(b), we show the expected evasion delay as a function of M M +L for various values of K(i) and for dynamic spectrum networks. This graph corresponds to equation (12). For a fixed value of K(i), a behavior similar to the case of static spectrum networks is observed.…”
Section: Simulation and Numerical Examplesmentioning
confidence: 58%
“…5(b), we show the expected evasion delay as a function of M M +L for various values of K(i) and for dynamic spectrum networks. This graph corresponds to equation (12). For a fixed value of K(i), a behavior similar to the case of static spectrum networks is observed.…”
Section: Simulation and Numerical Examplesmentioning
confidence: 58%
“…RELATED WORK Jamming-resistant communication has long been an active research area [10], [11], [13], [19]. To provide jammingresistant broadcast, several group-based schemes were studied [3]- [5].…”
Section: Performance Analysismentioning
confidence: 99%
“…Random and periodic jamming techniques 13 allow the jammer to avoid detection by alternating between intervals of active jamming and hibernation. Cross-layer jamming 8,10,11,17 incorporates information from higher layers in the network protocol stack into physical layer jamming, allowing the jammer to reduce resource expenditure by several orders of magnitude, but requiring intimate knowledge of network protocols. Reactive jamming 13 allows the jammer to reduce resource expenditure by only jamming the wireless channel when packet transmissions are detected, though the effectiveness of this technique is limited by network geometry.…”
Section: Iib Interfering and Jamming Devicesmentioning
confidence: 99%
“…A naïve strategy such as jamming continuously over a wide frequency band would cause significant disruptions over a short period of time but would also easily be detected, limiting the effectiveness of the approach. Hence, an intelligent jammer who wants to cause significant network disruption may employ sophisticated strategies [8][9][10][11] to avoid detection which would otherwise truncate the attack duration. Similarly, the aircraft system may choose to modify the communication and networking protocols in order to avoid interference from the jamming transmissions and to improve overall performance in the presence of jamming.…”
Section: Introductionmentioning
confidence: 99%