Defending Against Jamming Attacks in Wireless Local Area Networks

  • Wei Chen
  • Danwei Chen
  • Guozi Sun
  • Yingzhou Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


Wireless local area networks(WLANs) work upon a shared medium and broadcast data frames via radio waves. These features let legitimate users connect to Internet conveniently at WLAN access points but also let a malicious attacker misuse network flexibly. Attackers can launch jamming attacks by exploiting vulnerabilities in 802.11, which is a dominant protocol used by WLAN. We discuss two jamming attacks, RTS and CTS jamming, and address their attacking conditions and threats. To defend against jamming attacks, a CUSUM based detection method is proposed, which can accurately detect jamming attacks with little computation and storage cost. When continuous attacking packets are sent out, a change-point will appear in a traffic sequence. Our detection method is capable to observe such change-points and then launch alarms. The efficiency of defense methods is verified by simulation results.


Access Point Hide Node Wireless Local Area Network Network Allocation Vector Hide Node Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hubaux, J.P., Butty, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc 2001), pp. 146–155. ACM Press, New York (2001)CrossRefGoogle Scholar
  2. 2.
    Butty, L., Hubaux, J.P.: Report on a working session on security in wireless ad hoc networks. SIGMOBILE Mobile Computing and Communications Review 7, 74–94 (2003)CrossRefGoogle Scholar
  3. 3.
    Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC, pp. 15–28 (2003)Google Scholar
  4. 4.
    Brodsky, B.: Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, Netherlands (1993)Google Scholar
  5. 5.
    Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proceedings of MILCOM 2002. vol. 2, pp. 1118–1123 (2002)Google Scholar
  6. 6.
    Housley, R., Arbaugh, W.: Security problems in 802.11-based networks. Communications of ACM 46, 31–34 (2003)CrossRefGoogle Scholar
  7. 7.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. ACM Press, New York (2005)CrossRefGoogle Scholar
  8. 8.
    Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of the 10th annual international conference on Mobile computing and networking (MobiCom 2004), pp. 202–215. ACM Press, New York (2004)CrossRefGoogle Scholar
  9. 9.
    McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of 2005 IEEE Symposium on Security and Privacy, pp. 64–78 (2005)Google Scholar
  10. 10.
    Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceeding of 2004 ACM workshop on Wireless security, pp. 80–89 (2004)Google Scholar
  11. 11.
    Raya, M., Hubaux, J.P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys 2004), pp. 84–97. ACM Press, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Wei Chen
    • 1
  • Danwei Chen
    • 1
  • Guozi Sun
    • 1
  • Yingzhou Zhang
    • 1
  1. 1.Computer College, Nanjing University of Posts and Telecommunications, Nanjing 210003, JiangsuChina

Personalised recommendations