Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless &Amp; Mobile Networks 2014
DOI: 10.1145/2627393.2627403
|View full text |Cite
|
Sign up to set email alerts
|

Gaining insight on friendly jamming in a real-world IEEE 802.11 network

Abstract: Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious aspects have received much attention in the literature. Yet, several recent works propose to turn the table and employ so-called friendly jamming for the benefit of a wireless network. For example, recently proposed friendly jamming applications include hiding communication channels, injection attack defense, and access control. This work investigates the practical viability of friendly jamming by applying it in a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 29 publications
(25 citation statements)
references
References 35 publications
0
25
0
Order By: Relevance
“…Because the selected chipset is supported by different kernel driver and firmware, we developed the required software from scratch making the new system back-compatible with the old configuration files 3 .…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Because the selected chipset is supported by different kernel driver and firmware, we developed the required software from scratch making the new system back-compatible with the old configuration files 3 .…”
Section: Methodsmentioning
confidence: 99%
“…This is a great challenge as such components are typically underpowered which makes it hard to meet the timing constraints imposed by reactive jamming (which already pose a challenge for powerful software-defined platforms [2]). For customer-grade equipment, solutions to the underlying engineering challenges, such as reactive jamming, have begun to emerge only recently [3], [38].…”
Section: B System Challenges Of Friendly Jammingmentioning
confidence: 99%
See 1 more Smart Citation
“…Like many other cards, its behaviour is ruled by a firmware code that controls the underlying hardware (including the radio, carrier sense and FIFOs) in real time. In particular we used the BRCM4318KBFG PCI card as it is supported by the OpenFWWF [25] open-source firmware, an alternative to the original code from the manufacturer that has been recently considered as development platform in several research projects [15], [24], [37]- [39].…”
Section: Real Hardware Implementationmentioning
confidence: 99%
“…For our measurement testbed we use WRT54GL devices from Linksys. This choice was motivated by several reasons: i) their price is very affordable, less then 40 USD on ebay; ii) they run a very robust OpenWRT distribution based on Linux Kernel 2.6.32; iii) their wireless Network Interface Card (NIC) is compatible with OpenFWWF [37], an open source firmware that replaces the original binary-only software from Broadcom and has been widely used as research platform [38], [39], [40]. The basic version of OpenFWWF implements a fully working Distributed Coordination Function (DCF) and timestamps each incoming packet with the value of the Basic Service Set clock, sampled by the underlying hardware when a preamble is In each scenario, six nodes were kept fixed at locations marked by squares.…”
Section: A Testbed Setupmentioning
confidence: 99%