The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics,...

28
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe,Yanyong Zhang and Timothy Wood 1

Transcript of The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics,...

Page 1: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks

Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood

1

Page 2: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

OUTLINE

1. Introduction2. Jamming Attack Models3. Statistics for detecting jamming attacks4. Jamming Detection with consistency

checks5. Related Work6. Conclusion

2

Page 3: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

INTRODUCTIONWireless networks have gained great popularity. Is providing security is a critical issue??

An Adversary is empowered to launch a severe DoS attack by blocking the wireless medium. Jamming

The first stage in defense is understanding the types of Jamming attacks and …..

3

Page 4: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

4

Jammer Attack Models

Need tosend m

Is channel

idle?Backoff

start tosend m

No

Yes

Is channel

idle?BackoffNo

Yes

Normal MAC protocol:

Need tosend m

start tosend m

Jammer:

Page 5: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Constant Jammer

Constant Jammer- continually emits a radio signal (noise). The device will not wait for the channel to be idle before transmitting. Can disrupt even signal strength comparison protocols .

-100

-80

-60Constant Jammer

60dBm

)

-100

-80

-60CBR

5

Page 6: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Deceptive Jammer

Deceptive Jammer- constantly injects regular packets with no gap between packets. A normal device will remain in the receive state and cannot switch to the send state because of the constant stream of incoming packets.

-100

-80

-60Deceptive Jammer

-100

-80

-60CBR

6

Page 7: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Random Jammer

Random Jammer- alternates between sleeping and jamming. Can act as constant or deceptive when jamming. Takes energy conservation into consideration.

-100

-80

-60CBR

0 200 400 600 800 1000 1200 1400 1600-100

-80

-60

sample seq ence n mber

Random Jammer

7

Page 8: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Reactive Jammer

Reactive Jammer- other three are active this is not. It stays quiet until there is activity on the channel. This targets the reception of a message. This style does not conserve energy however it may be harder to detect.

-100

-80

-60Reactive Jammer

-100

-80

-60CBR

8

Page 9: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

How do we measure Communication?

Packet Sent Ratio (PSR)-the ratio of packets successfully sent by a legitimate sender

- MAC protocols, Carrier-Sensing and signal strength comparison causing buffered and dropped packets

Packet Delivery Ratio (PDR)- ratio of packets successfully delivered compared to sent(packets may be corrupt even if received)

- measured by receiver with pass CRC and preamble

- measured by sender with packets sent and ACK

9

Page 10: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

10

Experiment SetupInvolving three parties:◦ Normal nodes:

Sender AReceiver B

◦ Jammer X

Parameters ◦ Four jammers model◦ Distance

Let dXB = dXA

Fix dAB at 30 inches

◦ PowerPA = PB = P X = -4dBm

◦ MACFix MAC thresholdAdaptive MAC threshold (BMAC)

Sender A

Receiver B

Jammer X

dXB

dAB

dXA

Page 11: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

11

Experiment Results

Constant Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

38.6 74.37 0.43 1.00 1.94

54.0 77.17 0.53 1.02 2.91

72.0 99.57 93.57 0.92 3.26

Constant Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

38.6 74.37 0.43 1.00 1.94

54.0 77.17 0.53 1.02 2.91

72.0 99.57 93.57 0.92 3.26

Constant Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

38.6 74.37 0.43 1.00 1.94

54.0 77.17 0.53 1.02 2.91

72.0 99.57 93.57 0.92 3.26

Reactive Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

m =7bytes

38.6 99.00 0.00 100.0 0.00

54.0 100.0 99.24 100.0 99.87

72.0 100.0 99.35 100.0 99.87

m =33bytes

38.6 99.00 0.00 100.0 0.00

44.0 99.00 58.05 100.0 87.26

54.0 99.25 98.00 100.0 99.53

Reactive Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

m =7bytes

38.6 99.00 0.00 100.0 0.00

54.0 100.0 99.24 100.0 99.87

72.0 100.0 99.35 100.0 99.87

m =33bytes

38.6 99.00 0.00 100.0 0.00

44.0 99.00 58.05 100.0 87.26

54.0 99.25 98.00 100.0 99.53

Reactive Jammer

dxa (inch)BMAC FixMAC

PSR(%) PDR(%) PSR(%) PDR(%)

m =7bytes

38.6 99.00 0.00 100.0 0.00

54.0 100.0 99.24 100.0 99.87

72.0 100.0 99.35 100.0 99.87

m =33bytes

38.6 99.00 0.00 100.0 0.00

44.0 99.00 58.05 100.0 87.26

54.0 99.25 98.00 100.0 99.53

Page 12: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

What attributes will help us detect jamming?

Signal Strength

Carrier Sensing Time

Packet Delivery Ratio

12

Page 13: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Signal StrengthHow can we use Signal Strength to detect

Jamming?

Signal strength distribution may be affected by the presence of a jammer

Each device should gather its own statistics to make its own decisions on the possibility of jamming

Establish a base line or build a statistical model of normal energy levels prior to jamming of noise levels….But how??

13

Page 14: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Two Methods for Signal Strength 1. Basic Average and Energy Detection

We can extract two statistics from this reading, the average signal strength and the energy for detection over a period of time

2. Signal Strength Spectral DiscriminationA method that employs higher order crossings (HOC) to calculate the differences between samplesThis method is practical to implement on resource constrained wireless devices, such as sensor nodes

14

Page 15: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

SIGNAL STRENGTH

-The average values for the constant jammer and the MaxTraffic source are roughly equal

-the Constant jammer and deceptive jammer have roughly the same average values

-The signal strength average from a CBR source does not differ much from the reactive jammer scenario

- These results suggest that we may not be able to use simple statistics such as average signal strength to identify jamming

15

Page 16: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

More on Signal Strength•Not Successful

•We can not distinguish the reactive or random jammer from normal traffic

•A reactive or random jammer will alternate between busy and idle in the same way as normal traffic behaves

•HOC will work for some jammer scenarios but are not powerful enough to detect all jammer scenarios

16

Page 17: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Next….Carrier Sensing Time 802.11 uses CSMA and RTS/CTS so if the channel is occupied either a time out or stuck in channel sensingEstablish an average sensing time during normal traffic to allow you to compare when you may be jammed.Only works with fixed signal strength not adaptive thresholds such as BMAC.Determine when large sensing times are results of jamming by setting a threshold Threshold set conservatively to reduce false positive (significance testing)

17

Page 18: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Carrier Sensing Time Analysis

Observations:•It detects the Constant and Deceptive Jammer

•It does not detect the Reactive or Random Jammer

Sensing Time (ms)

Cumulative Distribution of Sensing Time

Cum

ulat

ive

Dis

trib

utio

n

18

Page 19: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Finally, the best for last….Packet Delivery RatioHow much PDR degradation can be caused by non-jamming, normal network dynamics, such as congestion? Result: PDR 78% It can be measured in two ways, by the sender or receiverthe PDR can be used to differentiate a jamming attack from a congested network.A simple threshold based on PDR is a powerful statistic to determine Jamming vs. congestion. It can not account for all network dynamics.

19

MaxTraffic Sender

Receiver

Page 20: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Basic Statistics SummaryBoth Signal Strength and Carrier Sensing time can only detect the constant and deceptive jammer.

Neither of these two statistics is effective in detecting the random or the reactive jammer.

PDR is a powerful statistic to determine Jamming vs. congestion. It can not account for all network dynamics.

20

Page 21: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

We need Consistency Checks to be Sure1. Signal Strength Consistency Checks2. Location Consistency Checks

AssumptionsEach node detects whether it is jammedEach node maintains a neighbor list from routing layerNetwork deployment is dense so each node has several neighborsAll legitimate nodes participate by sending heartbeat beacons( allows for reliable estimate of PDR over time)

21

Page 22: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

PRD/Signal Strength Consistency

Sample Signal

Strength

PDR consistent with

SS

No

Yes

PDR< Threshold

Not Jammed

Jammed

Yes

No

22

Page 23: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Observed Normal relationships

•High signal strength yields a high PDR•Low signal strength yields a low PDR

•Jammed scenario: a high signal strength but a low PDR

•The Jammed region has above 99% signal strength confidence intervals and whose PDR is below 65%

4.1 Signal Strength Consistency Checks

Jammed Region

PDR %

PDR VS. SS

SS(d

Bm

)

23

Page 24: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

PDR VS DISTANCEObservations:•Neighbors that are close should have high PDR values, if they have low PDR values they are Jammed

•All nodes advertise their current location and their PDRs to their neighbors to ensure there is a minimum amount of traffic to establish PDR. Thus PDR = 0 if no packets received

•Similar to the SS consistency check. An initial baseline to represent the profile of a normal environment (PDR,d) for each node.

•If a lower PDR is observed than should be for a given distance under normal radio conditions than the node declares it is Jammed.

24

Page 25: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

5. RELATED WORKThis work focuses on being able to detect and under stand attacks. Do you understand that you are under attack??

25

Page 26: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

Countermeasures : Physical layer design technologies such as spread spectrum work but have not found wide spread deployment in commodity wireless devices.

26

Page 27: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

• The use of Low density parity check codes, Reed-Solomon codes, channel surfing or on demand link layer frequency hopping and spatial retreats….yes, Run Away!!

27

Page 28: The Feasibility of Launching and Detecting Jamming Attacks ... · jamming, normal network dynamics, such as congestion? yResult: PDR 78% yIt can be measured in two ways, by the sender

6. CONCLUSIONS

Protecting our wireless networks is important

Jamming is a viable threat

Detecting Jamming is the first step in defeating it

28