scispace - formally typeset
Proceedings ArticleDOI

MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks

TLDR
A proof-of-concept defense, bi-directional path discovery to mitigate the devastating effect of mesh jamming, which can more efficiently attack the mesh path selection process by exploiting cross-layer knowledge and more harmfully influence on the path discovery performance compared to conventional jamming.
Abstract
Wireless mesh networks represent an emerging network architecture which has been actively studied and standardized for the last several years. Because of their flexible network architecture, wireless mesh networks can provide alternative paths even when wireless links are broken by node failures or routing attacks. Among a variety of mesh network protocols, we focus on the recently ratified IEEE 802.11s WLAN mesh standard. With analysis of the path selection scheme in 802.11s, we show the effect of conventional jamming on 802.11s-based wireless mesh networks via simulation. We then introduce mesh jamming, which can more efficiently attack the mesh path selection process by exploiting cross-layer knowledge and more harmfully influence on the path discovery performance compared to conventional jamming. We propose a proof-of-concept defense, bi-directional path discovery to mitigate the devastating effect of mesh jamming.

read more

Citations
More filters
Proceedings ArticleDOI

Jammer placement to partition wireless network

TL;DR: This paper considers the problem of determining how to efficiently position jammers so as to partition a wireless network and develops suboptimal solutions using spectral partitioning followed by greedy jammer placement and also a harmony search.
Proceedings ArticleDOI

Moving-Target defense mechanisms against Source-Selective jamming attacks in tactical cognitive radio MANETs

TL;DR: Experimental results show that the proposed techniques enable communications in the presence of source selective jamming attacks, and the probability that the first approach, random address assignment, fails to solve the correct source MAC address can be as small as 10-7 when using accurate parameter selection.
Proceedings ArticleDOI

An optimal jamming strategy to partition a wireless network

TL;DR: This paper considers the problem of determining how to efficiently place jammers to minimize the number of jammers needed to disrupt a network by partitioning it into a specified number of disconnected subnetworks, each of which is limited in size.
Proceedings ArticleDOI

JADE: Jamming-averse routing on cognitive radio mesh networks

TL;DR: The proposed JAD escorted (JADE) routing dramatically improves routing path discovery performance including path discovery probability, path length, elapsed time for path discovery, retransmission attempts, and path quality under reactive jamming.
Journal ArticleDOI

Null-frequency jamming of a proactive routing protocol in wireless mesh networks

TL;DR: This jamming technique was compared to constant, deceptive and random jamming techniques and was shown to outperform the techniques in terms of the energy expended by the wireless nodes in the networks.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Achieving single channel, full duplex wireless communication

TL;DR: In this paper, a single channel full-duplex wireless transceiver is proposed, which uses a combination of RF and baseband techniques to achieve FD with minimal effect on link reliability.
Proceedings ArticleDOI

The feasibility of launching and detecting jamming attacks in wireless networks

TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Proceedings ArticleDOI

A framework for reliable routing in mobile ad hoc networks

TL;DR: A modified version of the popular AODV protocol that allows us to discover multiple node-disjoint paths from a source to a destination and shows that the probability of establishing a reliable path between a random source and destination pair increases considerably even with a low percentage of reliable nodes.
Proceedings ArticleDOI

JAM: a jammed-area mapping service for sensor networks

TL;DR: A mapping protocol for nodes that surround a jammer which allows network applications to reason about the region as an entity, rather than as a collection of broken links and congested nodes is described.
Related Papers (5)