TY - GEN
T1 - Channel surfing and spatial retreats
T2 - Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
AU - Xu, Wenyuan
AU - Wood, Timothy
AU - Trappe, Wade
AU - Zhang, Yanyong
PY - 2004
Y1 - 2004
N2 - Wireless networks are built upon a shared medium that makes it easy for adversaries to launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing sources from communicating. These attacks can be easily accomplished by an adversary by either bypassing MAC-layer protocols, or emitting a radio signal targeted at jamming a particular channel. In this paper we present two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack. The first strategy, channel surfing, is a form of spectral evasion that involves legitimate wireless devices changing the channel that they are operating on. The second strategy, spatial retreats, is a form of spatial evasion whereby legitimate mobile devices move away from the locality of the DoS emitter. We study both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network. We evaluate several of our proposed strategies and protocols through ns-2 simulations and experiments on the Berkeley mote platform.
AB - Wireless networks are built upon a shared medium that makes it easy for adversaries to launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing sources from communicating. These attacks can be easily accomplished by an adversary by either bypassing MAC-layer protocols, or emitting a radio signal targeted at jamming a particular channel. In this paper we present two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack. The first strategy, channel surfing, is a form of spectral evasion that involves legitimate wireless devices changing the channel that they are operating on. The second strategy, spatial retreats, is a form of spatial evasion whereby legitimate mobile devices move away from the locality of the DoS emitter. We study both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network. We evaluate several of our proposed strategies and protocols through ns-2 simulations and experiments on the Berkeley mote platform.
KW - CSMA
KW - Denial of Service
KW - Jamming
UR - http://www.scopus.com/inward/record.url?scp=11244260535&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=11244260535&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:11244260535
SN - 158113925X
SN - 9781581139259
T3 - Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
SP - 80
EP - 89
BT - Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
Y2 - 1 October 2004 through 1 October 2004
ER -