Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2627788.2627798acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

A real-time and protocol-aware reactive jamming framework built on software-defined radios

Published: 18 August 2014 Publication History

Abstract

This paper develops a software-defined radio (SDR) framework for real-time reactive adversarial jamming in wireless networks. The system consists of detection and RF response infrastructure, implemented in the FPGA of a USRP N210 and designed to function with the open source GNU Radio SDR library. The framework can be used to implement a fast turnaround reactive jamming system capable of timely RF response within \textit{80ns} of signal detection. Our framework also allows for full control and feedback from the FPGA hardware to the GNU Radio-based cognitive radio backend, making it applicable to a wide range of preamble-based wireless communication schemes. This paper presents the capabilities, design, and experimental evaluation of this framework. Using this platform, we demonstrate real-time reactive jamming capabilities in both WiFi (802.11g) and mobile WiMAX (802.16e) networks and quantify jamming performances by measuring the network throughput using the iperf software tool. The results indicate that our system works reliably in real time as a reactive jammer and can be used for practical assessments of modern jamming and secure communication techniques.

References

[1]
GNU Radio. http://gnuradio.org/redmine/projects/gnuradio.
[2]
WARP Project. http://warpproject.org.
[3]
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the Performance of IEEE 802.11 under Jamming. In Proc. of INFOCOM, volume 0448330, pages 1265--1273, Apr. 2008.
[4]
J. Chen, S. Sen, M. Chiang, and D. J. Dorsey. A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications. In Proc. of CISS, 2013.
[5]
S. Gollakota and D. Katabi. iJam : Jamming Oneself for Secure Wireless Communication. Technical report, MIT, 2010.
[6]
S. Gollakota and D. Katabi. Physical layer wireless security made fast and channel independent. In Proc. of IEEE INFOCOM, pages 1125--1133, Apr. 2011.
[7]
M. Li, I. Koutsopoulos, and R. Poovendran. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In Proc. of IEEE INFOCOM, pages 1307--1315, 2007.
[8]
Y. Liu and P. Ning. BitTrickle: Defending against broadband and high-power reactive jamming attacks. In Proc. of IEEE INFOCOM, pages 909--917, Mar. 2012.
[9]
T. Pongthawornkamol and K. Nahrstedt. Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN. In Proc. of IEEE GLOBECOM, Dec. 2011.
[10]
S. Prasad and D. J. Thuente. Jamming attacks in 802.11g - A cognitive radio based approach. In Proc. of IEEE MILCOM, pages 1219--1224, Nov. 2011.
[11]
W. Shen, P. Ning, X. He, and H. Dai. Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. In Proc. of IEEE Symposium on Security and Privacy, pages 174--188, May 2013.
[12]
I. Shin, Y. Shen, Y. Xuan, M. T. Thai, and T. Znati. A Novel Approach Against Reactive Jamming Attacks. Journal of Ad Hoc & Sensor Wireless Networks, 12(1--2):125--149, 2011.
[13]
D. J. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proc. of IEEE MILCOM, pages 1075--1081, 2006.
[14]
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Reactive Jamming in Wireless Networks - How Realistic is the Threat? In Proc. of ACM WiSec, pages 47--52, 2011.
[15]
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc, pages 46--57, 2005.

Cited By

View all
  • (2024)Sensing Jamming Strategy From Limited Observations: An Imitation Learning PerspectiveIEEE Transactions on Signal Processing10.1109/TSP.2024.344312172(4098-4114)Online publication date: 2024
  • (2024)Spectrum Prediction for Protocol-Aware RF JammingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.332753810:2(363-373)Online publication date: Apr-2024
  • (2024)Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts2024 IEEE 49th Conference on Local Computer Networks (LCN)10.1109/LCN60385.2024.10639674(1-7)Online publication date: 8-Oct-2024
  • Show More Cited By

Index Terms

  1. A real-time and protocol-aware reactive jamming framework built on software-defined radios

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SRIF '14: Proceedings of the 2014 ACM workshop on Software radio implementation forum
    August 2014
    100 pages
    ISBN:9781450329958
    DOI:10.1145/2627788
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 August 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. denial of service
    2. reactive jamming
    3. software radios

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SIGCOMM'14
    Sponsor:
    SIGCOMM'14: ACM SIGCOMM 2014 Conference
    August 18, 2014
    Illinois, Chicago, USA

    Acceptance Rates

    SRIF '14 Paper Acceptance Rate 10 of 18 submissions, 56%;
    Overall Acceptance Rate 23 of 41 submissions, 56%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)170
    • Downloads (Last 6 weeks)24
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sensing Jamming Strategy From Limited Observations: An Imitation Learning PerspectiveIEEE Transactions on Signal Processing10.1109/TSP.2024.344312172(4098-4114)Online publication date: 2024
    • (2024)Spectrum Prediction for Protocol-Aware RF JammingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.332753810:2(363-373)Online publication date: Apr-2024
    • (2024)Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts2024 IEEE 49th Conference on Local Computer Networks (LCN)10.1109/LCN60385.2024.10639674(1-7)Online publication date: 8-Oct-2024
    • (2024)Deep Learning for Robust and Secure Wireless CommunicationsNetwork Security Empowered by Artificial Intelligence10.1007/978-3-031-53510-9_6(149-176)Online publication date: 24-Feb-2024
    • (2023)MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and CommandsProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607225(46-62)Online publication date: 16-Oct-2023
    • (2023)Wi-Fi Localization Obfuscation: An implementation in openwifiComputer Communications10.1016/j.comcom.2023.03.026205(1-13)Online publication date: May-2023
    • (2022)A Review of Counter-UAS Technologies for Cooperative Defensive Teams of DronesDrones10.3390/drones60300656:3(65)Online publication date: 1-Mar-2022
    • (2022)On the Implications of Spoofing and Jamming Aviation Datalink ApplicationsProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564651(548-560)Online publication date: 5-Dec-2022
    • (2022)On the Implementation of Location Obfuscation in openwifi and Its Performance2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)10.1109/MedComNet55087.2022.9810411(64-73)Online publication date: 1-Jun-2022
    • (2022)IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN53405.2022.00050(428-440)Online publication date: Jun-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media