2016
DOI: 10.1109/tmc.2015.2456916
|View full text |Cite
|
Sign up to set email alerts
|

Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems

Abstract: Frequency offset (FO) refers to the difference in the operating frequencies of two radio oscillators. Failure to compensate for the FO may lead to decoding errors, particularly in OFDM systems. To correct the FO, wireless standards append a publicly known preamble to every frame before transmission. In this paper, we demonstrate how an adversary can exploit the known preamble structure of OFDM-based wireless systems, particularly IEEE802.11a/g/n/ac, to launch a very stealth (low energy/duty cycle) reactive jam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…The common problem encountered is that the imperishable characteristic of wireless channels, such as the open and shared nature, has always been rendering those technologies vulnerable to the growing denial of service (DoS) attacks [2]. A phenomenon, if we notice, has emerged in the physical (PHY) layer that DoS attacks, with moderate size of the involved network segment and modest implementation complexity, have become increasingly common and potent [3].…”
Section: Introductionmentioning
confidence: 99%
“…The common problem encountered is that the imperishable characteristic of wireless channels, such as the open and shared nature, has always been rendering those technologies vulnerable to the growing denial of service (DoS) attacks [2]. A phenomenon, if we notice, has emerged in the physical (PHY) layer that DoS attacks, with moderate size of the involved network segment and modest implementation complexity, have become increasingly common and potent [3].…”
Section: Introductionmentioning
confidence: 99%
“…B Y injecting faked or replayed signals, a jammer aims to interrupt the ongoing communication of mobile devices such as smartphones, mobile sensing robots and mobile servers, and even launch denial of service (DoS) attacks in wireless networks [1]- [5]. With the pervasion of smart radio devices such as universal software radio peripherals (USRPs) [6], jammers can cooperatively and flexibly choose their jamming policies to block the mobile devices efficiently [7], [8]. Jammers can even induce the mobile device to enter a specific communication mode and then launch the jamming attacks accordingly.…”
Section: Introductionmentioning
confidence: 99%
“…Algorithm 2: Hotbooting process 1 Initialize I, K, W , B, E = ∅, and θ (0) * 2 for i = 1, 2, · · · , I do 3 Initialize a emulational environment 4 Initialize SINR (0) and ψ (1) 5 for k = 1, 2, · · · , K do 6 Perform Steps 3 − 21 in Algorithm 1 to choose x (k) , obtain u (k) and observe ϕ (k+1)…”
mentioning
confidence: 99%
“…Orthogonal frequency-division multiplexing (OFDM) technique becomes such a typical victim when it plays an increasing role in modern wireless systems, standards (e.g., LTE, 802.11a/n/ac/ax/ah) or even under tactical scenarios [2]. Without comprehensive precautions against attacks, OFDM technique comes to be sensitive and fragile in the respect of its waveform transmission and receiving which is very vulnerable to various physical-layer attacks [3], [4]. This paper investigates the pilot-aware attack on the channel estimation process in multi-antenna OFDM communications [5].…”
Section: Introductionmentioning
confidence: 99%