Jamming ACK Attack to Wireless Networks and a Mitigation Approach

被引:5
|
作者
Zhang, Zhiguo [1 ]
Wu, Jingqi [1 ]
Deng, Jing [2 ]
Qiu, Meikang [3 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
[2] Univ N Carolina, Dept Comp Sci, Greensboro, NC 27402 USA
[3] Univ New Orleans, Dept Elect Engn, New Orleans, LA 70148 USA
关键词
D O I
10.1109/GLOCOM.2008.ECP.950
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the successful reception of the data packet. Such a protocol requirement may become a system weakness when malicious nodes attack these wireless networks. In this paper, we demonstrate the effects of such a Jamming ACK (JACK) attack to networks employing the popular Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme in IEEE 802.11 DCF. Our study shows that a JACK attacker can easily disrupt the traffic flow between two wireless nodes when it sends out JACK packets at the right time. The benefits of such a JACK attack include low energy consumption by the attacker, attack stealthiness, and great damage to the victim nodes. To mitigate the effects of JACK attacks, we propose in this paper an Extended Network Allocation Vector (ENAV) scheme. Our analysis and simulations show that the ENAV scheme recovers a significant portion of the lost throughput and reduces the energy drainage of the attacked nodes to 40%.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Routing Approach to Jamming Mitigation in Wireless Multihop Networks
    Patel, Umang
    Biswas, Trisha
    Dutta, Rudra
    [J]. 2011 18TH IEEE WORKSHOP ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2011,
  • [2] MITIGATION OF JAMMING ATTACKS IN WIRELESS NETWORKS
    Dorus, R.
    Vinoth, P.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 168 - 171
  • [3] Against Jamming Attack in Wireless Communication Networks: A Reinforcement Learning Approach
    Ma, Ding
    Wang, Yang
    Wu, Sai
    [J]. ELECTRONICS, 2024, 13 (07)
  • [4] Localization for Jamming Attack in Wireless Sensor Networks
    Zhang, Jing
    Xu, Li
    Shen, Qun
    Ji, Xiaorong
    [J]. INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 361 - 369
  • [5] Dynamic jamming mitigation for wireless broadcast networks
    Chiang, Jerry T.
    Hu, Yih-Chun
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 1885 - 1893
  • [6] New Slot-Head Jamming Attack and mitigation mechanism for Wireless Body Area Networks
    Achour, M'hammed
    Mana, Mohammed
    Rachedi, Abderrezak
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [7] A Survey of Jamming Attack Prevention Techniques in Wireless Networks
    Sowmya, S.
    Malarchelvi, P. D. Sheba Kezia
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [8] Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy
    Chen, Lin
    Leneutre, Jean
    [J]. COMPUTER NETWORKS, 2011, 55 (09) : 2259 - 2270
  • [9] Hybrid anti-jamming attack for wireless sensor networks
    Sun, Ziwen
    Xu, Yimin
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (09): : 2132 - 2140
  • [10] Persistent jamming in wireless local area networks: Attack and defense
    Lee, Il-Gu
    Kim, Myungchul
    [J]. COMPUTER NETWORKS, 2016, 109 : 67 - 83