Defending Against Jamming Attacks in Wireless Local Area Networks
Wireless local area networks(WLANs) work upon a shared medium and broadcast data frames via radio waves. These features let legitimate users connect to Internet conveniently at WLAN access points but also let a malicious attacker misuse network flexibly. Attackers can launch jamming attacks by exploiting vulnerabilities in 802.11, which is a dominant protocol used by WLAN. We discuss two jamming attacks, RTS and CTS jamming, and address their attacking conditions and threats. To defend against jamming attacks, a CUSUM based detection method is proposed, which can accurately detect jamming attacks with little computation and storage cost. When continuous attacking packets are sent out, a change-point will appear in a traffic sequence. Our detection method is capable to observe such change-points and then launch alarms. The efficiency of defense methods is verified by simulation results.
Unable to display preview. Download preview PDF.
- 3.Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, DC, pp. 15–28 (2003)Google Scholar
- 4.Brodsky, B.: Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, Netherlands (1993)Google Scholar
- 5.Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proceedings of MILCOM 2002. vol. 2, pp. 1118–1123 (2002)Google Scholar
- 9.McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of 2005 IEEE Symposium on Security and Privacy, pp. 64–78 (2005)Google Scholar
- 10.Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceeding of 2004 ACM workshop on Wireless security, pp. 80–89 (2004)Google Scholar