Packet-hiding methods for preventing selective jamming attacks

Alejandro Proaño, Loukas Lazos

Research output: Contribution to journalArticlepeer-review

87 Scopus citations

Abstract

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

Original languageEnglish (US)
Article number5975172
Pages (from-to)101-114
Number of pages14
JournalIEEE Transactions on Dependable and Secure Computing
Volume9
Issue number1
DOIs
StatePublished - 2012

Keywords

  • Selective jamming
  • denial-of-service
  • packet classification
  • wireless networks

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Packet-hiding methods for preventing selective jamming attacks'. Together they form a unique fingerprint.

Cite this