gaining insight on friendly jamming in a real-world …dberger1/pdf/2014friendlyjamming.pdf ·...

Download Gaining Insight on Friendly Jamming in a Real-World …dberger1/pdf/2014FriendlyJamming.pdf · Gaining Insight on Friendly Jamming in a Real-World IEEE ... target signal arrives with

If you can't read please download the document

Upload: lethien

Post on 06-Feb-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • Gaining Insight on Friendly Jamming in a Real-World IEEE802.11 Network

    Daniel S. Berger, Francesco Gringoli, Nicol Facchi,Ivan Martinovic, and Jens Schmitt

    DISCO Lab, University of Kaiserslautern, GermanyCNIT - DII, University of Brescia, ItalyUniversity of Oxford, United Kingdom

    {berger,jschmitt}@cs.uni-kl.de,{francesco.gringoli,nicolo.facchi}@ing.unibs.it,

    [email protected]

    ABSTRACT

    Frequency jamming is the fiercest attack tool to disruptwireless communication and its malicious aspects have re-ceived much attention in the literature. Yet, several re-cent works propose to turn the table and employ so-calledfriendly jamming for the benefit of a wireless network. Forexample, recently proposed friendly jamming applicationsinclude hiding communication channels, injection attack de-fense, and access control.

    This work investigates the practical viability of friendlyjamming by applying it in a real-world network. To that end,we implemented a reactive and frame-selective jammer on aconsumer grade IEEE 802.11 access point. Equipped withthis, we conducted a three weeks real-world study on thejammers performance and side-effects on legitimate traffic(the cost of jamming) in a university office environment. Ourresults provide detailed insights on crucial factors governingthe trade-off between the effectiveness of friendly jamming(we evaluated up to 13 jammers) and its cost. In particular,we observed what we call the power amplification phe-nomenon an effect that aggravates the known hidden sta-tion problem when the number of jammers increases. How-ever, we also find evidence that this effect can be alleviatedby collaboration between jammers, which again enables ef-fective and minimally invasive friendly jamming.

    Categories and Subject Descriptors

    C.2.1 [Computer Communication Networks]: NetworkArchitecture and DesignWireless communication

    Keywords

    friendly jamming; jamming for good; defensive jamming;reactive jamming; IEEE 802.11; Wi-Fi; WLAN

    Permission to make digital or hard copies of all or part of this work for personal or

    classroom use is granted without fee provided that copies are not made or distributed

    for profit or commercial advantage and that copies bear this notice and the full citation

    on the first page. Copyrights for components of this work owned by others than the

    author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or

    republish, to post on servers or to redistribute to lists, requires prior specific permission

    and/or a fee. Request permissions from [email protected].

    WiSec14, July 2325, 2014, Oxford, UK.

    Copyright is held by the owner/author(s). Publication rights licensed to ACM.

    ACM 978-1-4503-2972-9/14/07 ...$15.00.

    http://dx.doi.org/10.1145/2627393.2627403.

    1. INTRODUCTIONRadio frequency jamming is commonly understood as a

    severe threat to the security and availability of wireless net-works. Such intentional interference effectively disrupts com-munication on the physical layer making mitigation hard. Inthe military context, jamming is an established primitive toblock an enemys communication, and even practical hand-books on this topic are available [13,25]. The same threat,however, also applies to the availability of civilian commu-nication networks and received significant research interest(e.g., [21, 23, 24, 27, 38]). Seen from the attackers perspec-tive, jamming is a simple, yet effective tool. However, theseare also desired properties for defense tools of a system andthus the question arises why not view jamming as a protec-tion tool.

    This question has recently motivated many researchersto envision positive use cases of jamming in wireless net-works (cf. a list of proposals in Table 1). Such positiveuse cases, however, have different requirements on the jam-ming technique. In the traditional attack setting, the jam-mer attempts to block any communication usually only sub-ject to stealthiness or energy constraints [23, 24]. On theother hand, realistic scenarios in which jamming is usedto benefit network operations introduce an orthogonal re-quirement: minimal invasiveness. In particular, in order tocoexist with other legitimate networks, only specific trans-missions should be targeted, whereas the impact on othertransmissions should be minimal. We henceforth denote byfriendly jamming such use cases in which jamming is usedfor the good and strives to be minimally invasive.

    While there are different jamming techniques (cf. a discus-sion in Section 2), minimal invasiveness requires reactive andframe-selective jamming. Reactive jamming has been char-acterized to be energy-efficient and effective [40], and is morelikely to comply with legal regulations1. Actually apply-ing friendly jamming in practice, however, faces many chal-lenges. Reactive and frame-selective jamming poses stricttiming constraints, and involves further engineering issuesfor which solutions have begun to emerge in recent years.

    1For example, the maximum duty cycle (the fraction of onesecond a transmitter is active) is commonly limited to smallvalues [10]. We briefly remark, however, that jamming, ingeneral, is a sensitive topic. For example, in the US theoperation, marketing, or selling of continuous jammers suchas GPS jammers, or cell phone blockers is prohibited [11].

  • Related Work Technology Problem addressed Js MethodologyJamming for good [22] 802.15.4 fake messages, unauth. comm. 3+ implementation and evaluationWiFire [36] 802.15.4 unauthenticated comm. 2 implementation and evaluationIMD shield [12] (propriet.) unauth. comm.,eavesdropping 1 implementation and evaluationJamming for Throughput [7] 802.11 performance: hidden terminals 1 theoretical analysisAlly Friendly Jamming [31] 802.11 unauthenticated comm. 2+ analysis, implementation, and evaluationDefend your home [6] 802.15.4 unauth. comm., fake messages 1 implementation and evaluationShout to Secure [16] 802.11 eavesdropping 1 simulationiJam [13] 802.11 key generation 1 implementationSecure Wi-Fi Zones [17] 802.11 eavesdropping 4+ theoretical analysis and implementationWire-Tap Channel (indep.) eavesdropping 1 theoretical analysis, implementations

    Table 1: This study is concerned with scenarios requiring a minimally invasive and distributed jammingsystem (and an IEEE 802.11 b/g network). Similar scenarios are assumed in [6,7,12,22,31,36], whereas [13,16,17] and also the Wire-Tap Channel scenario (umbrella term coined by Wyner [39], see also [8,20,30,33,41,42])usually do not assume minimal invasiveness, e.g., the whole channel is often continuously blocked.

    Hence, a critical issue is whether friendly jamming worksas desired under real-world conditions, i.e., under multipatheffects and attenuation, or fast channel fading in a dynamicenvironment. On a high level, this is thus the key questionwe address in this paper: Is friendly jamming practicallyviable in a real-world 802.11 network?

    Answering this question by a real-world measurement study,we delve into the details of two issues, the performance ofjamming and its related cost. As we will see these two haveto be traded off against each other and the details of thattrade-off depend on several factors that we investigate. Webase our measurement study on the most widely deployedwireless communication standard, IEEE 802.11. To thatend, we implemented a friendly jammer by modifying themicrocode of the wireless chipset in a customer-grade accesspoint, which has been certified to comply with legal regula-tions on power and spectral density requirements. Over aperiod of three weeks we ran a friendly jamming scenario,recorded all messages exchanged at different vantage points,and investigated the jammers performance as well as neg-ative side-effects on legitimate traffic. By this, we hope toprovide an understanding of friendly jamming in the wildand thus foster further research in this promising and inter-esting domain2.

    Specifically, we collected the following main insights fromour real-world study:

    1. We found clear evidence that a large number of jam-mers is required to ensure high hit ratios.

    2. The sequence of unjammed frames possesses a memo-ryless property rendering predictions based on pastobservations inefficient, which makes their exploitationharder (which is good).

    3. The cost of friendly jamming lies mainly in what wecall the power amplification effect, which results in anaggravation of hidden station problems.

    4. Collaboratively selecting the best jammers can boostthe effectiveness of multiple jammers while minimizingthe cost of jamming.

    2We distribute a ready-to run version of our implementationon our project page http://www.ing.unibs.it/~openfwwf/friendlyjammer/. It also holds condensed result tables andsamples of the measurement data we ask for brief emailinquiry to obtain the full source code and measurement data.

    10090807060

    3000 4000 5000 6000 7000time [us]

    RS

    S [dB

    m]

    Figure 2: A particular challenge of friendly jammingis to enable coexistence with other legitimate net-works traffic (e.g., not to jam the beacon in the cen-ter) while accurately jamming target frames (here:all of the short frames).

    5. In additional simulations based on our measurementswe investigated more thorough the underlying reasonswhy perfect jamming is often infeasible.

    The rest of this paper is structured as follows. In Section 2we given an introduction to friendly jamming. The setup ofour experiments is introduced in Section 3 and is followed byour main results in Section 4. Section 5 contains a technicalanalysis of jamming success. We discuss related work inSection 6 and conclude in Section 7.

    2. FRIENDLY JAMMING:

    CONCEPTS AND CONSTRAINTSThere are several techniques to disrupt a wireless trans-

    mission. The most fundamental approach addresses thephysical layer on which intentional interference causes er-rors when decoding a transmissions data. In this sectionwe describe enabling techniques for (radio frequency) jam-ming; in particular, we focus on a description of reactivejamming as the technique, which lies at the foundation offriendly jamming. We conclude this section with an outlookon evaluation aspects for our real-world study.

    2.1 Proactive vs. Reactive JammingThere is a variety of techniques to create intentional in-

    terference. Continuously emitting a high power signal, forexample, requires a lot of power and does not admit otheruses of the channel. Other approaches are deceptive jam-ming (deceiving stations that the channel is occupied), ran-dom jamming (randomly alternating between sleeping andjamming), and reactive jamming [24, 40]. In reactive jam-ming, the interfering signal is emitted only when anothersignal is detected. This can be done selectively by analyzing

  • 110

    90

    70

    50

    7960 7970 7980 7990 8000time [us]

    RS

    S[d

    Bm

    ]

    TRAIN SFD PLCP CTL DUR ADDR1 ADDR2 SEQ# ADDR3 ADDR4 DATA

    reactanalyzedetect

    Figure 1: Left: in order for the jamming frame Fjam to successfully interfere with the target frame Ftarget (i.e.,to render it irrecoverable) it is necessary that the superimposed signals power Pjammed is significantly higherthan Ptarget. Right: reactive jamming involves three steps: detecting the signal by means of the trainingsequence, analyzing the signal to decide whether or not to jam, and, if so, emitting the jamming signal.

    signals and interfering only with certain ones. Therefore, re-active jamming is the most attractive jamming technique forfriendly jamming and can yield minimally invasive applica-tions. This technique is often considered the most sophisti-cated jamming technique [24] and entails several challenges.

    2.2 Reactive Jamming ChallengesReactive jamming starts with the task of channel sensing

    in order to detect a target frame (a signal in IEEE 802.11terminology). The target frames detection and further de-coding can only be achieved by jammers which are well posi-tioned with regard to the arriving signal (to be specific: thetarget signal arrives with high signal-to-noise-ratio (SNR)).This position, with respect to the sender and environmentalconditions, is thus an important factor for jamming success.

    After having detected the signal, the jammer starts the de-coding and analysis in order to take a jamming decision. Ina realistic scenario, the jammer needs to distinguish betweentarget frames and legitimate frames (Figure 2). While thejamming hit ratio (# jammed frames /# sent frames) ofthe former needs to be maximized, the impact of jammingon the latter shall remain small. This trade-off is furtherconstrained by the fact that the decision has to be takenvery fast. We recall these timing constraints by consider-ing, say, a frame comprising a medium-sized 100 Bytes UDPpacket. If this frame is transmitted at the fastest 802.11gModulation and Coding Scheme (MCS), its duration is only48s. If we further assume that the jamming decision de-pends on bits in the MAC header (e.g., the senders MACaddress), the remaining part of the frame is even another24s shorter. In the remaining time, the jammers decisioncode has to be executed, the hardware needs to switch fromreceive to transmission mode, and the jamming signal hasto be emitted.

    Once the signal is emitted, successful jamming dependson the target frames MCS and the jamming signals power.While higher power drives high jamming success, this fac-tor is subject to legal regulations and is a crucial factor forthe detrimental impact on legitimate traffic. A final aspectconcerns the systems view of jamming as concurrent jam-mers can improve upon both the target frame detection andthe jamming signals power level. Therefore, the number ofconcurrent jammer is another important success factor.

    2.3 Evaluating Friendly JammingIn comparison to an attackers perspective on jamming,

    friendly jamming demands a broader evaluation scope. Whilethe jammers hit ratio (and corresponding factors) are animportant performance aspect, we additionally have to con-sider some friendly jamming specific aspects. In particular,estimating the cost of jamming in terms of potential nega-tive side effects on other legitimate transmissions is of great

    interest. Another question poses itself for friendly jammingin a security setting: is an attacker on the network able topredict jamming misses (which could then be exploited)?This predictability constitutes the main attack vector onfriendly jamming systems and, accordingly, should be keptas low as possible. Finally, we argue that an experimen-tal friendly jamming deployment has to be considered froma worst-case perspective. Therefore, our experimental setupassumes a random placement of jammers instead of choosingpreoptimized jammer positions.

    3. EXPERIMENTAL SETUPA practical evaluation of the factors described in the pre-

    vious section requires a realistic implementation and evalu-ations in a complex radio communication environment. Inthis section we briefly introduce our realization of a friendlyjammer, some micro benchmarks to ensure the systems ba-sic operation, and the deployment used for the result in Sec-tion 4.

    3.1 Jammer Hardware and ImplementationIn order to encounter realistic hardware constraints, we

    implemented the reactive jammer for our experiments oncheap customer-grade hardware that has been certified tocomply with regulatory rules. We start with a brief descrip-tion of this jammer.

    Our jammer is implemented directly on the Network In-terface Card (NIC) of the popular WRT54GL platform. Ac-cess to this resource was facilitated by an open source mi-crocode for the access points IEEE 802.11 NIC (released bythe OpenFWWF [14] project). This microcode replaces theproprietary Broadcom image and allows direct control of allmedium access, decoding, and encoding operations subjectto some (humble) hardware constraints due to the micro-controllers original purpose. Similarly to [5, 28] we alteredthe receive path in the assembly code and compiled the jam-mers functionality in our own microcode that would be rundirectly on the NIC.

    A principal advantage of the Broadcom NIC that we usedis that the microcode can analyze a frame while still receiv-ing it: this feature enables us to implement flexible filteringrules to decide whether or not to emit a jam signal. Forexample, the check can be based on matching an incomingframes header to a dynamic bit mask dynamically config-ured from the host system. The experiments in Section 4,however, are based on a simple match of a frames transmit-ter address. After the jamming decision has been positivelyevaluated, the jammer aborts the current reception, switchesto transmission mode, and delivers the jam frame to a se-rializer, which further handles its emission through the RFcircuitry. The jam signal has to be a standard compliant

  • dist 1 Jammer 2 Jammers 3 Jammers5.4m 98.93% (0.19) 100.0% (0.00) 99.98% (0.02)6.7m 98.57% (0.85) 99.95% (0.04) 100.0% (0.01)8.1m 77.03% (12.30) 98.37% (0.29) 99.43% (0.14)

    Table 2: Open-space hit ratio (97.5% confidence in-tervals) under 14 jammers and different distances.

    20

    40

    60

    80

    100

    0 1 2 3 4 5 6 7 8 9 10 11 12 13# jammers

    hit r

    atio [%

    ] receiver

    mfar

    mmiddle

    mclose

    Figure 5: The hit ratio is significantly lower in-doorsthan in open-space due to attenuation. (0 jammerscorresponds to packet loss without jamming.)

    MCS. To accurately track sent, received, and valid-checksumstatistics, we implemented corresponding low-level countersthat were not impacted by the operation system.

    In summary, our setup was carefully crafted to obtain re-liable target traffic and accurate measurements.

    3.4 Measurement DataThe experiments were conducted over a three week pe-

    riod In November and December 2013 to observe differentconditions and utilization of the wireless channel. Time wasdivided into short experiments each of about 150s, where ineach experiment a random number and selection of jammerswere activated uniformly from all possible combinations. Intotal, this setup generated 13660 experiments with about350GB of measurement data comprising almost 370 milliontarget frames and 490 million legitimate-traffic frames.

    This concludes our description of the experimental setupand we next report on the insights obtained in this setting.

    4. RESULTS ON FRIENDLY JAMMING IN

    THE REAL WORLDIn this section, we investigate the trade-off between jam-

    ming performance and the cost of friendly jamming under(worst case) random selection of jammer positions; whilethe jamming performance increases with the number of jam-mers, the cost of jamming also goes up. We also find evi-dence that friendly jamming can overcome the constraintsof this trade-off by collaboration schemes that heuristicallyselect the most appropriate subset of jammers.

    The confidence intervals throughout this section give 97.5%confidence based on the t-distribution. We start by describ-ing performance aspects of friendly jamming under the fac-tors discussed in Section 2.

    4.1 The Jamming PerformanceA direct metric to determine a jammers performance is

    the hit ratio for which Figures 5 and 6 show a selection ofsignificant factors.

    Number of Jammers. We first evaluate the effect of thenumber of jammers being used. Both in an ideal open-spaceenvironment (Table 2) and our dynamic indoor setting (Fig-ure 5), an increasing number of jammers increases the hitratio due to improving the detection and emitted power of

    72 172 272 372 472 572 672 772 872 972 1072

    0j

    2 102 202 302 402 502 602 702 802 902 1002

    3j

    65 165 265 365 465 565 665 765 865 965 1065

    7j

    38 138 238 338 438 538 638 738 838 938 1038

    13j

    Figure 7: Sequence number diagrams visualize therequirement for several concurrent jammers. Fromabove to below: 0, 3, 7, 13 jammers. In each, blackbar: valid checksum, white bar: jammed.

    20

    40

    60

    20 40 60theoretical geometric distribution

    sam

    ple

    3

    jam

    mers

    0

    100

    200

    300

    400

    0 100 200 300 400theoretical geometric distribution

    sam

    ple

    7

    jam

    mers

    Figure 8: Quantile-quantile plots show good corre-spondence with a geometric distribution for sevenjammers (right) but not for three jammers (left).

    the jammers. Note, however, that in the open-space environ-ment one may grossly underestimate the number of jammersnecessary for the realistic environment. We observed that asingle jammer significantly impacts the target packet rate.Nevertheless, some positions close to the target receiver yieldlow hit ratios an observation that can be partly explainedby the high and irregular attenuation of the office environ-ment (also see the analysis in Section 5). Due to this, a singlejammers hit ratio lies between 60 90% (averaged over allpositions). At least three jammers are required to sustainan average hit ratio above 90%, seven jammers for 99%, andthe hit ratio graphs slope only flattens out for more thaneleven jammers. This appears to be robust across receiversat different proximities, which yielded distinct packets lossrates without any jammers (19 48% at 12 75m, cf. Fig-ure 4). These figures are probably higher than expected andmust be taken as caveat for friendly jamming applications.

    Position-Dependence. In a open-space testbed the hit ra-tio monotonically decreases with the jammers distance fromthe receiver; in contrast to this, in-door behavior is quite er-ratic and there are weak positions even close to a targetreceiver (cf. Figure 6(left)). The impact of these weak po-sitions is more pronounced for robust MCSs (those whichare based on direct sequence spread spectrum), and lowernumbers of jammers. For example, the hit ratio when av-eraging over random placement of three jammers decreasessignificantly for the robust MCS 1Mb/s, as shown in Fig-ure 6(center). Already for seven jammers, this issue mostlydisappears as it is more likely that a good position is in-cluded in the active jammer set.

    Invariance to Seasonal Effects. Figure 6(right) shows theaverage rate of legitimate traffic and the hit ratio of threeand seven jammers over the measurement period. Whilethe legitimate traffic rate shows the expected habitual vari-ations, the hit ratio remains pretty stable for both three andseven jammers. For three jammers, we observe some excep-tions to this, e.g., on November 20 the hit ratio of three

  • 0

    25

    50

    75

    100

    3 6 9 12distance: jammer to receiver [m]

    hit r

    atio

    [%

    ]

    rate

    54

    11

    6

    1

    0

    25

    50

    75

    100

    10 20distance: jammer to receiver [m]

    hit r

    atio

    [%

    ]

    rate

    54

    11

    6

    1

    20

    40

    60

    80

    100

    1 6 11 54adapter rate [Mbps]

    hit r

    atio

    [%

    ]

    receiver

    mfar

    mmiddle

    mclose

    20

    40

    60

    80

    100

    1 6 11 54adapter rate [Mbps]

    hit r

    atio

    [%

    ]

    receiver

    mfar

    mmiddle

    mclose

    1

    2

    day

    avg [M

    b/s

    ]

    60

    70

    80

    90

    100

    hit r

    atio [%

    ]

    60

    70

    80

    90

    100

    Mon 18Nov Mon 25Nov Mon 02Dec

    hit r

    atio [%

    ] receiver mfar

    mmiddle

    mclose

    Figure 6: Left: in open space a single jammers hit ratio decreases monotonically with the distance (top),whereas the indoor evaluation shows erratic behavior (bottom), indicating the need for careful real-worlddeployments. Center: robust adapter rates (MCSs) such as 1Mb/s have a tremendous impact on the hit ratioof three jammers (top), but less on seven jammers (bottom). Right: while the legitimate traffics throughputshows weekly patterns (top), the hit ratio of three (center) and seven (bottom) jammers remain almost stable.

    jammers goes down significantly due to some untraceableevents about which we could only speculate. Note, however,that we observe no impact on seven jammers.

    Temporal Distribution of Misses. Besides the hit ratio,another metric to determine a jammers performance can bebased on temporal correlations of missed frames. If jammingis used to block an attacker from sending, e.g., maliciouspackets, then runs of consecutively missed frames constitutea greater threat compared to the case in which the samenumber of frames was missed spread-out over time. Figure 7shows a sequence number diagram of representative traces,which depicts how increasing the number of jammers yieldsa more uniform distribution of the missed frames over the se-quence number space. We formalize this aspect by a stochas-tic miss model. The quantile-quantile plots in Figure 8 showthat for seven jammers, the geometric distribution yields agood fit. Since the geometric distribution is memoryless, i.e.,having observed any number of past misses does not yieldinformation about a future miss, this property ensures thatthe prediction of future target frame misses (attack oppor-tunities) is hard even when an attacker is able to observethe friendly jamming system over a long time. However, ouranalysis shows that at least seven jammers are required toprovide this property. For example, three active jammersare not enough to enforce this property (Figure 8(left)).

    This section gave an overview on global jamming perfor-mance aspects. Note that the specific values of the hit ratiodepend on our implementation, which we deliberately basedon cheap customer-grade hardware as a feasibility study.However, we argue that some of the fundamental proper-ties presented in this section apply to a much broader set ofjammers, which adhere to FCC or EU regulations.

    The next section focuses on an orthogonal aspect howinvasive is friendly jamming.

    4.2 The Cost of Friendly JammingIn this section, we investigate the side effects of friendly

    jamming on legitimate traffic in the network. Note that le-gitimate frames have not been targeted by the frame-selectivejammers; instead, any adverse effect on legitimate traffic iscollateral the cost of friendly jamming.

    timelegitimat

    e transmission

    starget

    sleg

    rleg

    rtargetjammer

    target transmission

    jamming signal

    Figure 9: Assume that a target transmission anda remote legitimate transmission would be inter-ference free without jammer. Nevertheless, a jam-mer located between them may interfere with bothtransmissions: intentionally, with the target trans-mission; collaterally, with the legitimate transmis-sion. We call this effect power amplification.

    In order to assess this cost, we distinguish legitimate framesfrom target frames (and, possibly, jamming signals) in ourmeasurement data. This required some attention becausefragments resulting from the target and jammers framescould not easily be distinguished from actual legitimate framesdue to high bit error levels. We used a two-run procedure onthe measurement data: the first run discovered valid legit-imate transmitter MAC addresses, and the actual analysiswas carried out on a second run in which frames with smallHamming distance from the legitimate addresses were con-sidered. This analysis was also verified selectively down tothe bit level of individual frames.

    Loss of Legitimate Traffic and Power Amplification. In-creasing the number of jammers affects legitimate differentlydepending on their respective positions (with regard to thetarget sender and the jammers). We attribute this effect towhat we call the power amplification effect: the jammerscan significantly increase the interference radius of any tar-get transmission. This can be seen by considering a scenario(see Figure 9 for an illustration) in which a legitimate senderis located far away from the target sender and transmissionsof the two senders would be free of interference. Assume ajammer is located between the two senders and can receiveand interfere with transmissions of both senders. If the legit-imate sender starts a transmission, the target source couldpossibly start a concurrent transmission as well. Withoutjammers, both transmissions may proceed without prob-

  • 75

    80

    85

    90

    95

    100

    rnd scls rcls rxrt ideal

    hit r

    atio

    [%

    ]

    40

    60

    80

    100

    rnd scls rcls rxrt idealno

    rma

    lize

    d p

    acke

    t lo

    ss [

    %]

    Figure 14: Left: the hit ratio of the proposedjammer-collaboration schemes. Right: the packetloss of far-away packets (affected by the power am-plification phenomenon) normalized to random jam-mer configurations with the same hit ratio.

    the (re)associations of individual stations, and found thatthere is a small number of significantly affected stations.Figure 13(right) depicts that there exist some far-away sta-tions that loose connectivity more likely with an increasingnumber of active jammers. Interestingly, we also found ev-idence of a close-by station, which is more badly affectedwhen there is a small jammer count.

    In summary, we again emphasize the trade-off betweenjamming performance and the cost of jamming: enabling alarger number of jammers is necessary to boost the hit ratiobut also increases the collateral damage to legitimate traf-fic. While not unexpected, we obtained detailed quantitativestatements on the cost of jamming in a real-world 802.11 net-work. These results were obtained under the assumption ofrandom jammer placement a limitation a jamming systemmight be able to overcome, and which we investigate in thefollowing section.

    4.3 Jammer Collaboration SchemesIn this section, we show the potential of jammer collab-

    oration, by which we mean that jammers are selected ac-cording to some deterministic rule instead of randomly asabove. This promises to improve the hit ratio while remain-ing marginally invasive, based on the previous sections find-ing that the jammers position is critical to both the perfor-mance and cost of friendly jamming. We investigate this po-tential by comparing three practical collaboration schemesto the theoretic optimum observed in our experiments.

    The simplest idea is to select the jammer closest to thesender (e.g., realized by trilateration) and is called s-cls. Ifthe jamming system can observe bidirectional communica-tion attempts between targets, the jammers may be able toinfer the location of the intended receiver and the jammersclosest to the receiver can be selected. One can expect thecorresponding scheme, r-cls, to improve the hit ratio becauserespective jammers would be closer to the receiver and thustheir jam signals arrive with higher energy. Our third prac-tical scheme is based on the idea to select jammers based ontheir reception quality. More specifically, the scheme rx-rtselects those jammers that received the highest number oftarget frames. While this heuristic only considers the chan-nel from the receiver to the jammer, one may speculate thatit also corresponds to better jamming positions in general.

    We evaluate these schemes performance with three jam-mers. The theoretical ideal scheme, which always picks themost successful jammers based on a posteriori knowledge,and the average performance of random jammer placementare considered as ground truth. Figure 14 compares the hitratio of the schemes and the magnitude of their respective

    14 114 214 314 414 514 614 714 814 914 1014

    scls

    16 116 216 316 416 516 616 716 816 916 1016

    rcls

    18 118 218 318 418 518 618 718 818 918 1018

    rxrt

    98 198 298 398 498 598 698 798 898 998 1098

    ideal

    Figure 15: Sequence number diagrams shows theeffectiveness of the collaboration schemes already forthree jammers compare to Figure 7.

    power amplification effects. The latter is measured as thenormalized packet loss of far-away packets where normaliza-tion is done to configurations that yield the same hit ratio4.

    The simple s-cls scheme significantly increases the jam-ming performance and also reduces the effect of the poweramplification phenomenon. We attribute this improvementto the fact that the receiver and the sender are positionedclose to each other and far-away jammers are efficiently ex-cluded. The extension, the r-cls scheme, yields a slightlybetter hit ratio than s-cls and can reduce the packet losseven further. However, we remark that this scheme is lesspractical than s-cls. The third practical scheme rx-rt canoutperform s-cls slightly, but with overlapping confidenceintervals. While all collaboration schemes improve signif-icantly over random jammer selection, their hit ratios are2.54% below the ideal case indicating some further roomfor improvement and more sophisticated schemes.

    We also compared sequence number diagrams of the fourproposed collaboration schemes. Figure 15 displays the dif-ferences of the schemes with respect to this performancemetric. It again also shows the gap in performance to theideal case. Nevertheless, while the misses of the randomjammer selection do not possess the memoryless propertyof the geometric distribution, the misses of all collaborationschemes come closer (r-cls) or achieve it (s-cls, rx-rt).We also studied the schemes for seven jammers. In that

    case, the mean hit ratio is about 98.95% for s-cls, 99.41%for r-cls, 99.62% for rx-rt, and 99.95% for the ideal case.

    This completes the measurement analysis, and we nextaddress the jamming success in more detail.

    5. DETAILED ANALYSIS OF JAMMING

    SUCCESSIn the previous section, we observed friendly jamming to

    hit target traffic only imperfectly as there will always besome successfully received frames under power constraints.This finding holds even under very favorable conditions: thelong-term hit ratio in a static environment (at night) withlarge numbers of jammers with constant jamming powernever reaches 100%. Under the assumption that only de-tection, reaction time, and power determine jamming suc-cess (for fixed MCS and other conditions), one may wonderwhy this is the case. This section investigates explanationsfor this somewhat mysterious finding. In particular, we alsoaddress the reason why jamming affects frame differentlydespite equal power levels.

    4If scheme x achieves a hit ratio of 90%, the normalizedpacket loss of x is: (packet loss of x) / (packet loss of randomjammer configuration, which yields a 90% hit ratio)

  • Figure 18: An explanation for the observation thatjamming is only sometimes successful at the samejamming power: the jamming success depends onboth the relative amplitude (jamming signal to tar-get signal) and the symbol alignment. For each sym-bol, four alignments are displayed: jamming is suc-cessful for exact bit alignment (0%) and small devi-ation (25%, 75%). Jammed packets are often decod-able for an alignment corresponding to a 50% sym-bol delay (the peaks). Top: single frame, bottom:entire trace with shades of gray corresponding tojamming/decoding probability.

    full Barker chip sequences (2s, 22 chips), but find that thejamming success is determined mostly by the alignment withrespect to each symbol.

    We next extend the same analysis to additional 27 frames.We can interpret this analysis stochastically as the proba-bility that frames can be decoded for a specific combinationof alignment and jam amplitude. Figure 18(bottom) showsthat, in principle, the findings obtained for a single framecarry over to the other frames in our trace. However, notethat there are subtle differences. For example, the minimaljam amplitude required increases by 3 5% and the pa-rameter regions indicating jamming success are less clearlydefined. At the highest evaluated jamming amplitude of120%, some frames can still be decoded for a particular con-figuration that corresponds to an alignment close to a fullBarker sequence (close but not exactly bit alignment).

    We also extended the simulations to the case of two jam-mers: the same method as before is used, but the jam frameis superimposed twice (independently) with all 28 frames inthe capture. We explored the space of all possible symbol-alignments for both jam frames and consider the fractionof decodable packets for an equal amplitude for both jamsignals. Figure 20 shows the improvement of a two-jammerconfiguration over a single jammer for low relative jam am-plitudes of 37%, 59%, or 74% (from left to right). Whilemost frames can be decoded for a single jammer, two jam-mers improve the jamming success rate significantly. Never-theless, the actual effectiveness still depends on the respec-tive symbol alignments: the jammers are successful if theiralignment corresponds to delays close to 50%, as expected.

    Finally, we connect the pieces of symbol alignment, jamamplitude, and the number of jammers: we consider the hitratio as the average probability resulting under the assump-

    differentframes differentframes

    Figure 19: The simulated hit ratio for differentframes (averaged over all symbol alignments) showsthat two jammers significantly increase the hit ratiofor low to medium jam amplitudes.

    tion that any symbol alignment can occur with the sameprobability. Figure 19 shows that doubling the number ofjammers more than doubles the hit ratio; for example, whenthe amplitude is 50%, a single jammers hit ratio is maxi-mally 20%, but with two jammers a hit ratio of 4090% canbe obtained. This is due to the fact that unfavorable symbolalignments for several jammers at the same time become in-creasingly unlikely since the jammers behave independently(a probabilistic explanation results from the superpositionof uniform distributions which result in low probability forsimultaneously bad alignments).

    6. RELATED WORKFriendly jamming relates to a variety of research topics in

    the field of radio communication. In this section, we brieflyreview previous work on friendly jamming applications, eval-uations, and studies on interference properties.

    Friendly Jamming Applications. Recent proposals can beroughly grouped into two main categories based on theirintentions: 1) jamming for blocking unauthorized commu-nications [6, 12, 22, 31, 36], and 2) jamming for improvingsecrecy of communications [12, 16, 17, 33] (see also works onthe Wire-Tap Channel due to Wyner [39]).The first categoryis the most relevant motivation our study. For example, Gol-lakota et al. [12] and Brown et al. [6] propose to use reactivejamming to block unauthorized commands from being trans-mitted to implantable medical devices (IMDs) or to devicesin the smart home. Similarly, Wilhelm et al. [36] rely onreactive jamming to enforce rules similar to a firewall. Allfriendly jamming proposals of this category share the goalof jamming only particular frames in the air motivating thusthe evaluation of the cost of jamming in Section 4.2.

    The second category also employs jamming as a tool butaddresses a different use case. Intentional interference en-sures that eavesdropping is rendered infeasible since the jammedmessages cannot be decoded. Authorized nodes, however,can successfully receive the messages as the interfering sig-nal is known to them (as a shared secret): these nodes cancelout the interfering signal to recover the original message. Aninteresting work by Kim et al. [17] defines a computationalmodel to optimize the arrangement of jammers protectingan area around an access point. Their setting differs fromour setting in that the jammers continuously emit a jamsignal and the corresponding negative impact on other net-works can only be controlled by power settings and the useof directional antennas (and is not evaluated in their work).

    Evaluation of Friendly Jamming. Previous works mainlyimplemented reactive jamming on software defined radio(SDR) platforms (e.g., [4,6,36,37]) and did not target realis-

  • Figure 20: Results from simulations of two artificial jam frames indicate that the jam amplitude for successfuljamming is significantly lowered, compared to a single jammer: while a relative amplitude of 37% (left) isineffective, already 59% (center) greatly improves the jamming performance, for 74% (right) the jammers arealmost always successful. These plots result from averaging over (all possible) alignments for 28 packets of areal trace (brighter shades of gray indicate higher jamming success).

    tic customer-grade access points. The reaction times consti-tutes a particular challenge in enabling frame-selective jam-ming on these platforms. For example, Bayraktaroglu etal. [4] reports reaction times in the order of milliseconds andcannot target high-rate IEEE 802.11. Instead, the slowerIEEE 802.15.4 standard has often been used to evaluatefriendly jamming proposals. For example, Brown et al. [6]report hit ratios of 98.9 100% in a testbed scenario andWilhelm et al. [36, 37] achieve a reaction time of 39s anda 97.6% hit ratio with one jammer (99.9 for two concurrentjammers) in an indoor office environment (however, for ashort term, non-dynamic experiment).

    To the best of our knowledge, we are the first to sys-tematically evaluate the performance and cost of friendlyjamming in a real-world environment. Having said that,the feasibility of friendly jamming with respect to secrecyapplications, however, has recently been thoroughly evalu-ated by Tippenhauer et al. [32]. Their study focuses on aspecific aspect compared to our more macroscopic view offriendly jamming: the confidentiality that can be providedby a jammer (see e.g., [8,12,20,30,31,33,41,42]). In their set-ting, the jammer and target source are located very close toeach other (1530cm) and communicate using the 400MHzband. For an attacker that is up to 3m away, Tippenhauer etal. demonstrated that jamming does not provide strong con-fidentiality guarantees for all configurations.

    Interference and Collisions in 802.11. Our simulationstudy of jamming success is related to the study of packeterror probabilities in face of non-intentional interference inIEEE 802.11 networks. These studies are largely motivatedby the capture effect. The capture effect describes the suc-cessful reception of the stronger signal under interference(even if starting a little later) [18]. Although intentional in-ference motivates a different perspective (such as the one inSection 5), the corresponding analysis often tries to answerthe same questions. In particular, while initial models onlyconsidered the role of relative timing on the frame level andthe received power [18, 19, 34], more recent capture modelsreport observations that agrees with our analysis.

    These works come to a similar conclusion to ours, i.e., thatthe power ratio between interfering signals is not sufficientto build a capture effect model, but other parameters, suchas time and phase offset of sender and receiver, have to beincorporated into the analysis [9, 19,26,29,35].

    7. CONCLUSIONSystem proposals for friendly jamming applications have

    received substantial research interest in recent years. Yet,a reality test was lacking, which is why we investigatedfriendly jamming at work in a real-word 802.11 network forthree weeks. The main insights we collected from these are:1) a rather high number of jammers is required to achievea high hit ratio across different modulations, 2) the identi-fication and quantification of the power amplification phe-nomenon which represents a shadow cost of friendly jam-ming, and 3) the effectiveness of potential jammer collabo-ration schemes in achieving a good trade-off between jam-ming performance and cost. The actual implementationof such collaboration is left for further study as it is mostlikely very application-dependent which scheme is realizableprotocol-wise and which performance/cost trade-off needsto achieved. Besides the rather black-box oriented measure-ment results on friendly jamming, we also used simulationsof the reception process of superimposed signals to investi-gate the question why perfect jamming is not always feasible.The analysis revealed a strong dependence of the jammingsuccess on the symbol alignment between target and jamframe(s), opening up another interesting opportunity for fu-ture research: can friendly jammers boost their hit ratiosby sending jam signals that are synchronized with the tar-get signal? Throughout the paper, we assumed jammers tohave no energy restrictions, yet, in the literature there arealso jammers with a limited energy budget, therefore releas-ing this assumption could be another future work item.

    Acknowledgments

    We thank our anonymous reviewers for their insightful com-ments on improving various aspects of this work. In par-ticular, we thank our shepherd, Panos Papadimitratos, forhis valuable time and guidance. This research was partiallysupported by the EUs 7FP grant n.258301 (CREW).

    8. REFERENCES[1] D. Adamy. EW 101: a first course in electronic warfare,

    volume 1. Artech House, 2000.[2] D. Adamy. EW 102: a second course in electronic warfare,

    volume 2. Artech House, 2004.

    [3] D. Adamy. EW 103: Tactical battlefield communicationselectronic warfare. Artech House, 2008.

  • [4] E. Bayraktaroglu, C. King, X. Liu, G. Noubir,R. Rajaraman, and B. Thapa. On the Performance of IEEE802.11 under Jamming. In Proceedings of IEEEINFOCOM, pages 12651273. IEEE, Apr. 2008.

    [5] G. Bianchi, P. Gallo, D. Garlisi, F. Giuliano, F. Gringoli,and I. Tinnirello. Maclets: Active mac protocols overhard-coded devices. In Proceedings of ACM CoNEXT.ACM, December 2012.

    [6] J. Brown, I. E. Bagci, A. King, and U. Roedig. Defend yourhome!: Jamming unsolicited messages in the smart home.In Proceedings of ACM HotWiSec, pages 16, New York,NY, USA, 2013. ACM.

    [7] Y. Cai, K. Xu, Y. Mo, B. Wang, and M. Zhou. ImprovingWLAN throughput via reactive jamming in the presence ofhidden terminals. In Proceedings of IEEE WCNC, pages10851090. IEEE, Apr. 2013.

    [8] L. Dong, H. Yousefizadeh, and H. Jafarkhani. Cooperativejamming and power allocation for wireless relay networks inpresence of eavesdropper. In Proceedings of IEEE ICC,pages 15, June 2011.

    [9] P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J. M. Liang,and A. Terzis. Design and evaluation of a versatile andefficient receiver-initiated link layer for low-power wireless.In Proceedings of ACM SenSys, pages 114, New York,New York, USA, 2010. ACM.

    [10] ETSI. EN 300 328 V1.8.1 Electromagnetic compatibilityand Radio spectrum Matters (ERM), August 2012.http://www.etsi.org/deliver/etsi_en/300300_300399/300328/01.08.01_60/en_300328v010801p.pdf.

    [11] FCC. Jamming Prohibition. last accessed 2014/13/02http://www.fcc.gov/encyclopedia/jammer-enforcement.

    [12] S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, andK. Fu. They can hear your heartbeats: Non-invasivesecurity for implantable medical devices. In Proceedings ofACM SIGCOMM, pages 213, New York, NY, USA, 2011.

    [13] S. Gollakota and D. Katabi. Physical layer wireless securitymade fast and channel independent. 2011 ProceedingsIEEE INFOCOM, pages 11251133, Apr. 2011.

    [14] F. Gringoli and L. Nava. Openfwwf: Open firmware for wifinetworks. available at http://www.ing.unibs.it/ openfwwf/.

    [15] IEEE. Standard 802.11 1999 edition (r2003) IEEE standardfor information technologytelecommunications andinformation exchange between systemslocal andmetropolitan area networksspecific requirementspart 11:Wireless lan medium access control (mac) and physicallayer (phy) specifications, June 2003.

    [16] M. Jorgensen, B. Yanakiev, G. Kirkelund, P. Popovski,H. Yomo, and T. Larsen. Shout to secure: Physical-layerwireless security with known interference. In Proceedings ofIEEE GLOBECOM, pages 3338, Nov 2007.

    [17] Y. S. Kim, P. Tague, H. Lee, and H. Kim. Carving securewi-fi zones with defensive jamming. In Proceedings of ACMASIACCS, pages 5354, New York, NY, USA, 2012. ACM.

    [18] A. Kochut, A. Vasan, A. Shankar, and A. Agrawala.Sniffing out the correct physical layer capture model in802.11b. In Proceedings of IEEE ICNP, pages 252261,October 2004.

    [19] J. Lee, W. Kim, S.-J. Lee, D. Jo, J. Ryu, T. Kwon, andY. Choi. An experimental study on the capture effect in802.11a networks. In Proceedings of ACM WinTECH,pages 1926, New York, NY, USA, 2007. ACM.

    [20] Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wirelesssystems via lower layer enforcements. In Proceedings ofACM WiSe, pages 3342, New York, NY, USA, 2006. ACM.

    [21] G. Lin and G. Noubir. On link layer denial of service indata wireless LANs. Wireless Communications and MobileComputing, 5(3):273284, May 2005.

    [22] I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming forgood. In Proceedings of ACM WiSec, page 161, New York,New York, USA, Mar. 2009. ACM Press.

    [23] A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, andG. Pantziou. A survey on jamming attacks andcountermeasures in WSNs. IEEE Communications Surveys& Tutorials, 11(4):4256, April 2009.

    [24] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy.Denial of service attacks in wireless networks: The case ofjammers. IEEE Communications Surveys & Tutorials,13(2):245257, 2011.

    [25] R. Poisel. Modern Communications Jamming: Principlesand Techniques. Artech House, 2011.

    [26] C. Popper, N. Tippenhauer, B. Danev, and S. Capkun.Investigation of signal and message manipulations on thewireless channel. In V. Atluri and C. Diaz, editors,Computer Security ESORICS 2011, volume 6879 ofLecture Notes in Computer Science, pages 4059. SpringerBerlin Heidelberg, 2011.

    [27] D. R. Raymond and S. Midkiff. Denial-of-service in wirelesssensor networks: Attacks and defenses. IEEE PervasiveComputing, 7(1):7481, January 2008.

    [28] P. Salvador, F. Gringoli, V. Mancuso, P. Serrano,A. Mannocci, and A. Banchs. Voipiggy: Implementationand evaluation of a mechanism to boost voice capacity in802.11 wlans. In Proceedings of IEEE INFOCOM. IEEE,March 2012.

    [29] N. Santhapuri, S. Nelakuditi, and R. Choudhury. On spatialreuse and capture in ad hoc networks. In Proceedings ofIEEE WCNC, pages 16281633, March 2008.

    [30] A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, andD. Towsley. Physical layer security from inter-sessioninterference in large wireless networks. In Proceedings IEEEINFOCOM, pages 11791187. IEEE, 2012.

    [31] W. Shen, P. Ning, X. He, and H. Dai. Ally friendlyjamming: How to jam your enemy and maintain your ownwireless connectivity at the same time. In Proceedings ofIEEE S&P, pages 174188, May 2013.

    [32] N. O. Tippenhauer, L. Malisa, A. Ranganathan, andS. Capkun. On Limitations of Friendly Jamming forConfidentiality. In Proceedings of IEEE S&P, pages160173, May 2013.

    [33] J. Vilela, P. Pinto, and J. Barros. Position-based jammingfor enhanced wireless secrecy. IEEE Transactions onInformation Forensics and Security, 6(3):616627, Sept.2011.

    [34] K. Whitehouse, A. Woo, F. Jiang, J. Polastre, andD. Culler. Exploiting the capture effect for collisiondetection and recovery. In Proceedings of IEEE EmNetS,pages 4552, May 2005.

    [35] M. Wilhelm, V. Lenders, and J. B. Schmitt. An AnalyticalModel of Packet Collisions in IEEE 802.15.4 WirelessNetworks. CoRR, abs/1309.4, 2013.

    [36] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders.WiFire: a firewall for wireless networks. Proceedings ofACM SIGCOMM, pages 456457, 2011.

    [37] M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders.Short paper: reactive jamming in wireless networks: howrealistic is the threat? In Proceedings of ACM WiSec,pages 4752, New York, NY, USA, 2011. ACM.

    [38] A. Wood and J. Stankovic. Denial of service in sensornetworks. Computer, 35(10):5462, 2002.

    [39] A. D. Wyner. The wire-tap channel. Bell System TechnicalJournal, 54(8):13551387, 1975.

    [40] W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibilityof launching and detecting jamming attacks in wirelessnetworks. In Proceedings of ACM MobiHoc, pages 4657,New York, NY, USA, 2005. ACM.

    [41] X. Zhou and M. McKay. Physical layer security withartificial noise: Secrecy capacity and optimal powerallocation. In Proceedings of ICSPCS, pages 15, Sept 2009.

    [42] X. Zhou, M. Tao, and R. Kennedy. Cooperative jammingfor secrecy in decentralized wireless networks. InProceedings of IEEE ICC, pages 23392344, June 2012.

    IntroductionFriendly Jamming: Concepts and ConstraintsProactive vs. Reactive JammingReactive Jamming ChallengesEvaluating Friendly Jamming

    Experimental SetupJammer Hardware and ImplementationMicro Benchmarks and Optimal Jamming SignalDeployment and Device ConfigurationMeasurement Data

    Results on Friendly Jamming in the Real WorldThe Jamming PerformanceThe Cost of Friendly JammingJammer Collaboration Schemes

    Detailed Analysis of Jamming SuccessThe Reception Process of DSSSImpact of a Jammer's Symbol AlignmentTrace-based Simulation Results

    Related WorkConclusionReferences