Jamming-resistant rate control in Wi-fi networks

Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would...

Full description

Bibliographic Details
Main Author: Orakcal, Cankut
Language:en_US
Published: Boston University 2015
Online Access:https://hdl.handle.net/2144/12550
id ndltd-bu.edu-oai-open.bu.edu-2144-12550
record_format oai_dc
spelling ndltd-bu.edu-oai-open.bu.edu-2144-125502019-03-25T06:37:51Z Jamming-resistant rate control in Wi-fi networks Orakcal, Cankut Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. Recent experimental studies reveal that several well-known and widely deployed rate adaptation algorithms (RAAs) in 802.11 WLANs are vulnerable to selective jamming attacks. However, previous work resorts to complex jamming strategies that are hard to implement and does not provide applicable solutions to this problem. In this work, we analyze the vulnerabilities of existing RAAs to simple jamming attacks and propose judicious use of randomization to address this problem. We in- troduce a theoretical framework based on a bursty periodic jamming model to analyze the vulnerabilities of popular RAAs, such as ARF, AARF, Onoe, and SampleRate. Our parameterized analysis shows that a jamming rate of 10% or below is sufficient to bring the throughput of these algorithms below the base rate of 1 Mb/s. Thereafter, we propose a new algorithm, called Randomized ARF (RARF), that is resistant to jamming attacks. We derive a closed-form lower bound on the minimum jamming rate required to keep the throughput of RARF below the base rate. We also analyze a recently proposed randomized RAA called Minstrel and compare its performance to RARF under alternative jamming models. Finally, we conduct ns-3 simulations implementing the various RAAs and jam- ming strategies for an IEEE 802.11g WLAN. Our simulations validate the jamming strategies under different channel models and show that the minimum jamming rate required against RARF is about 33%. 2015-08-05T00:58:01Z 2015-08-05T00:58:01Z 2012 2012 Thesis/Dissertation (ALMA)contemp https://hdl.handle.net/2144/12550 en_US Boston University
collection NDLTD
language en_US
sources NDLTD
description Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. === Recent experimental studies reveal that several well-known and widely deployed rate adaptation algorithms (RAAs) in 802.11 WLANs are vulnerable to selective jamming attacks. However, previous work resorts to complex jamming strategies that are hard to implement and does not provide applicable solutions to this problem. In this work, we analyze the vulnerabilities of existing RAAs to simple jamming attacks and propose judicious use of randomization to address this problem. We in- troduce a theoretical framework based on a bursty periodic jamming model to analyze the vulnerabilities of popular RAAs, such as ARF, AARF, Onoe, and SampleRate. Our parameterized analysis shows that a jamming rate of 10% or below is sufficient to bring the throughput of these algorithms below the base rate of 1 Mb/s. Thereafter, we propose a new algorithm, called Randomized ARF (RARF), that is resistant to jamming attacks. We derive a closed-form lower bound on the minimum jamming rate required to keep the throughput of RARF below the base rate. We also analyze a recently proposed randomized RAA called Minstrel and compare its performance to RARF under alternative jamming models. Finally, we conduct ns-3 simulations implementing the various RAAs and jam- ming strategies for an IEEE 802.11g WLAN. Our simulations validate the jamming strategies under different channel models and show that the minimum jamming rate required against RARF is about 33%.
author Orakcal, Cankut
spellingShingle Orakcal, Cankut
Jamming-resistant rate control in Wi-fi networks
author_facet Orakcal, Cankut
author_sort Orakcal, Cankut
title Jamming-resistant rate control in Wi-fi networks
title_short Jamming-resistant rate control in Wi-fi networks
title_full Jamming-resistant rate control in Wi-fi networks
title_fullStr Jamming-resistant rate control in Wi-fi networks
title_full_unstemmed Jamming-resistant rate control in Wi-fi networks
title_sort jamming-resistant rate control in wi-fi networks
publisher Boston University
publishDate 2015
url https://hdl.handle.net/2144/12550
work_keys_str_mv AT orakcalcankut jammingresistantratecontrolinwifinetworks
_version_ 1719006780583837696