Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Understanding and mitigating the impact of RF interference on 802.11 networks

Published: 27 August 2007 Publication History
  • Get Citation Alerts
  • Abstract

    We study the impact on 802.11 networks of RF interference from devices such as Zigbee and cordless phones that increasingly crowd the 2.4GHz ISM band, and from devices such as wireless camera jammers and non-compliant 802.11 devices that seek to disrupt 802.11 operation. Our experiments show that commodity 802.11 equipment is surprisingly vulnerable to certain patterns of weak or narrow-band interference. This enables us to disrupt a link with an interfering signal whose power is 1000 times weaker than the victim's 802.11 signals, or to shut down a multiple AP, multiple channel managed network at a location with a single radio interferer. We identify several factors that lead to these vulnerabilities, ranging from MAC layer driver implementation strategies to PHY layer radio frequency implementation strategies. Our results further show that these factors are not overcome by simply changing 802.11 operational parameters (such as CCA threshold, rate and packet size) with the exception of frequency shifts. This leads us to explore rapid channel hopping as a strategy to withstand RF interference. We prototype a channel hopping design using PRISM NICs, and find that it can sustain throughput at levels of RF interference well above that needed to disrupt unmodified links, and at a reasonable cost in terms of switching overheads.

    References

    [1]
    A brief tutorial on the PHY and MAC layers of the IEEE 802.11b Standard, http://tinyurl.com/2d6f48.
    [2]
    A comparison of frequency hopping and direct sequence spread spectrum modulation for IEEE 802.11 applications at 2.4 GHz, http://www.sss-mag.com/pdf/ds-v-fh.pdf.
    [3]
    A. Akella, G. Judd, S. Seshan, and P. Steenkiste. Self management in chaotic wireless deployments. In MobiCom '05.
    [4]
    ANT personal area networks, http://www.thisisant.com/.
    [5]
    P. Bahl, R. Chandra, and J. Dunagan. SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks. In MobiCom '04.
    [6]
    J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Usenix Security 2003.
    [7]
    Bluetooth coexistence with 802.11, http://tinyurl.com/2grndv.
    [8]
    CC2420 Data Sheet, http://tinyurl.com/ytut3k.
    [9]
    CC2500 Data Sheet, http://tinyurl.com/7xfhm.
    [10]
    Citywide wireless broadband projects around the world, http://www.muniwireless.com/.
    [11]
    Denial of Service Vulnerability in IEEE 802.11 Wireless Devices, http://tinyurl.com/26x94r.
    [12]
    J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye. Feasibility study of mesh networks for all-wireless offices. In MobiSys 2006.
    [13]
    F. Ferreri, M. Bernaschi, and L. Valcamonici. Access points vulnerabilities to DoS attacks in 802.11 networks. In WCNC 2004.
    [14]
    S. Glass and V. Muthukkumarasamy. 802.11 DCF denial of service vulnerabilities. In 3rd Australian Computer, Network & Information Forensics Conference.
    [15]
    HFA3683A RF Front-End Data Sheet, http://tinyurl.com/24yxml.
    [16]
    HFA3863 Baseband Processor Data Sheet, http://tinyurl.com/22tkwt.
    [17]
    K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu. Impact of interference on multi-hop wireless network performance. In MobiCom '03.
    [18]
    T. Karhima, A. Silvennoinen, M. Hall, and S.-G. Haggman. IEEE 802.11 b/g wlan tolerance to jamming. In MILCOM 2004.
    [19]
    M. Kodialam and T. Nandagopal. Characterizing achievable rates in multi-hop wireless networks: the joint routing and scheduling problem. In MobiCom '03.
    [20]
    M. Lacage and T. Henderson. Yet Another Network Simulator. In WNS2'06: Proc. of the 2006 workshop on ns-2.
    [21]
    A. Mishra, V. Shrivastava, D. Agrawal, S. Banerjee, and S. Ganguly. Distributed channel management in uncoordinated wireless environments. In MobiCom'06.
    [22]
    A. Mishra, V. Shrivastava, S. Banerjee, and W. Arbaugh. Partially overlapped channels not considered harmful. In SIGMETRICS '06.
    [23]
    V. Navda, A. Bohra, S. Ganguly, R. Izmailov, and D. Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE Infocom Minisymposium, May 2007.
    [24]
    J. Park, D. kim, C. Kang, and D. Hong. Effect of partial band jamming on ofdm-based wlan in 802.11g. In ICASSP 2003.
    [25]
    PRISM Driver Programmer's Manual, http://tinyurl.com/yrqh27.
    [26]
    Quick guide to IEEE 802.11 WG activities, http://tinyurl.com/ypojvc.
    [27]
    T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR.
    [28]
    The Stargate platform, http://tinyurl.com/2bld2v.
    [29]
    Wii interference with 802.11, http://tinyurl.com/y4gyvv.
    [30]
    Wireless camera jammer for privacy, http://tinyurl.com/2esyv4.
    [31]
    WirelessUSB from Cypress Semiconductors, http://tinyurl.com/ywjo8s.

    Cited By

    View all
    • (2024)Adaptive Whitening and Feature Gradient Smoothing-Based Anti-Sample Attack Method for Modulated Signals in Frequency-Hopping CommunicationElectronics10.3390/electronics1309178413:9(1784)Online publication date: 5-May-2024
    • (2024)Interference Effects on Bandwidth Availability for UAV Communications2024 Integrated Communications, Navigation and Surveillance Conference (ICNS)10.1109/ICNS60906.2024.10550835(1-6)Online publication date: 23-Apr-2024
    • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-wOnline publication date: 24-Apr-2024
    • Show More Cited By

    Index Terms

    1. Understanding and mitigating the impact of RF interference on 802.11 networks

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM SIGCOMM Computer Communication Review
          ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
          October 2007
          420 pages
          ISSN:0146-4833
          DOI:10.1145/1282427
          Issue’s Table of Contents
          • cover image ACM Conferences
            SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
            August 2007
            432 pages
            ISBN:9781595937131
            DOI:10.1145/1282380
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 27 August 2007
          Published in SIGCOMM-CCR Volume 37, Issue 4

          Check for updates

          Author Tags

          1. 802.11
          2. RF interference
          3. SINR
          4. channel hopping
          5. jamming

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)161
          • Downloads (Last 6 weeks)20
          Reflects downloads up to 27 Jul 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Adaptive Whitening and Feature Gradient Smoothing-Based Anti-Sample Attack Method for Modulated Signals in Frequency-Hopping CommunicationElectronics10.3390/electronics1309178413:9(1784)Online publication date: 5-May-2024
          • (2024)Interference Effects on Bandwidth Availability for UAV Communications2024 Integrated Communications, Navigation and Surveillance Conference (ICNS)10.1109/ICNS60906.2024.10550835(1-6)Online publication date: 23-Apr-2024
          • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-wOnline publication date: 24-Apr-2024
          • (2023)A Three-Tier Deep Learning-Based Channel Access Method for WiFi NetworksIEEE Transactions on Machine Learning in Communications and Networking10.1109/TMLCN.2023.32880901(90-106)Online publication date: 2023
          • (2023)A Hierarchical Deep Learning Approach for Optimizing CCA Threshold and Transmit Power in Wi-Fi NetworksIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.32829849:5(1296-1307)Online publication date: Oct-2023
          • (2023)Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine LearningMILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM58377.2023.10356126(919-924)Online publication date: 30-Oct-2023
          • (2022)On the Security of the Wireless Electric Vehicle Charging Communication2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)10.1109/SmartGridComm52983.2022.9961000(393-398)Online publication date: 25-Oct-2022
          • (2022)Comparison of Contention-Based vs Timeslotted Channel Hopping Medium Access in Wireless Sensor Networks under Noisy Environment2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ITNAC55475.2022.9998416(7-12)Online publication date: 30-Nov-2022
          • (2022)RetroFlex: enabling intuitive human–robot collaboration with flexible retroreflective tagsCCF Transactions on Pervasive Computing and Interaction10.1007/s42486-022-00120-74:4(437-451)Online publication date: 28-Nov-2022
          • (2020)Interference Mapping in 3D for High-Density Indoor IoT DeploymentsWireless Sensor Networks - Design, Deployment and Applications [Working Title]10.5772/intechopen.93581Online publication date: 10-Sep-2020
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media