ABSTRACT
In this paper we study the impact of RF jamming on 802.11p car-to-car communications. We build a jammer on a software defined radio and implement constant, reactive and pilot jamming patterns, whose effectiveness is first measured in an anechoic chamber. We perform extensive experiments in two relevant outdoor scenarios, namely a straight road in an open space as well as a dense building scenario with a crossroad and characterize the performance of 802.11p communications under the impact of constant and reactive RF jamming. The constant jammer is able to dramatically disrupt communication regardless of the scenario. The reactive jammer exhibits a low impact in scenarios with reduced line-of-sight as its jamming success greatly depends on the relative position of the nodes. It is, however, very effective in open-space scenarios. In general, we observe that RF jamming can cause large communication-blind areas. Under these conditions, critical safety applications would simply fail in their purpose of timely warning dissemination.
- Ambient Noise Immunity (ANI) Patent. http://www.wipo.int/pctdb/en/wo.jsp?wo=2005067154.Google Scholar
- Rice University WARP Project. http://warp.rice.edu.Google Scholar
- IEEE 802.11p - Wireless Access in Vehicular Environments, Amendment 6 to 802.11, July 2010.Google Scholar
- IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Multi-channel Operation, July 2011.Google Scholar
- A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller. Attacks on Inter Vehicle Communication Systems - an Analysis. In Proc. of WIT, 2006.Google Scholar
- J. Bellardo and S. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proc. of USENIX, 2003. Google ScholarDigital Library
- M. Boban, T. T. V. Vinhoza, M. Ferreira, J. Barros, and O. Tonguz. Impact of Vehicles as Obstacles in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 29(1):15--28, 2011. Google ScholarDigital Library
- M. Briggs, J. Martinez, D. Bare, W. M. Ave, and A. R. Requirements. Power Measurements of OFDM Signals. In Proc. of EMC, 2004.Google ScholarCross Ref
- B. K. Chaurasia, S. Verma, and G. S. Tomar. Attacks on Anonymity in VANET. In Proc. of CIC, 2011. Google ScholarDigital Library
- T. Clancy. Efficient OFDM Denial: Pilot Jamming and Pilot Nulling. In Proc. of ICC, 2011.Google ScholarCross Ref
- A. Festag, R. Baldessari, W. Zhang, and L. Le. CAR-2-X Communication SDK - A Software Toolkit for Rapid Application Development and Experimentations. In Proc. of ICC Workshops, 2009.Google ScholarCross Ref
- R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan. Understanding and Mitigating the Impact of RF Interference on 802.11 Networks. In Proc. of SIGCOMM, 2007. Google ScholarDigital Library
- A. Hamieh, J. Ben-Othman, and L. Mokdad. Detection of Radio Interference Attacks in VANET. In Proc. of GLOBECOM, 2009. Google ScholarDigital Library
- I. Harjula, J. Pinola, and J. Prokkola. Performance of IEEE 802.11 Based WLAN Devices under Various Jamming Signals. In Proc. of MILCOM, 2011.Google ScholarCross Ref
- IEEE. 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2007.Google Scholar
- D. Jiang, Q. Chen, and L. Delgrossi. Optimal Data Rate Selection for Vehicle Safety Communications. In Proc. of VANET, 2008. Google ScholarDigital Library
- T. Karhima, A. Silvennoinen, M. Hall, and S.-G. Haggman. IEEE 802.11b/g WLAN Tolerance to Jamming. In Proc. of MILCOM, 2004.Google Scholar
- T. Mangel, O. Klemp, and H. Hartenstein. 5.9 GHz Inter-Vehicle Communication at Intersections: A Validated Non-Line-of-Sight Path-Loss and Fading Model. EURASIP Journal on Wireless Communications and Networking, 2011.Google ScholarCross Ref
- A. Paier, D. Faetani, and C. Mecklenbrauker. Performance Evaluation of IEEE 802.11p Physical Layer Infrastructure-to-Vehicle Real-World Measurements. In Proc. of ISABEL, 2010.Google ScholarCross Ref
- K. Pelechrinis, I. Broustis, S. Krishnamurthy, and C. Gkantsidis. A Measurement-Driven Anti-Jamming System for 802.11 Networks. IEEE/ACM Transactions on Networking, 19(4):1208--1222, 2011. Google ScholarDigital Library
- K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy. Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys Tutorials, 2011.Google ScholarCross Ref
- E. Schoch, F. Kargl, and T. Leinmüller. Vulnerabilities of Geocast Message Distribution. In Proc. of Autonet, 2007.Google ScholarCross Ref
- M. Segata and R. Lo Cigno. Emergency Braking: A Study of Network and Application Performance. In Proc. of VANET, 2011. Google ScholarDigital Library
- M. Strasser, B. Danev, and S. Čapkun. Detection of Reactive Jamming in Sensor Networks. ACM Transactions on Sensor Networks, 7(2):1--16, 2010. Google ScholarDigital Library
- I. Tinnirello, D. Giustiniano, L. Scalia, and G. Bianchi. On the Side-Effects of Proprietary Solutions for Fading and Interference Mitigation in IEEE 802.11b/g Outdoor Links. Computer Networks, 53(2):141--152, 2009. Google ScholarDigital Library
- M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. WiSec 2011 Demo: RFReact - A Real-Time Capable and Channel-Aware Jamming Platform. ACM SIGMOBILE Mobile Computing and Communications Review, 15(3):41--42, 2011. Google ScholarDigital Library
- W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network, 20(3):41--47, 2006. Google ScholarDigital Library
- W. Xu, W. Trappe, Y. Zhang, and T. Wood. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proc. of MobiHoc, 2005. Google ScholarDigital Library
- Y. Zhang and G. Cao. V-PADA: Vehicle-Platoon-Aware Data Access in VANETs. IEEE Transactions on Vehicular Technology, 60(5):2326--2339, 2011.Google ScholarCross Ref
Index Terms
- In VANETs we trust?: characterizing RF jamming in vehicular networks
Recommendations
Global revocation for the intersection collision warning safety application
VANET '12: Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applicationsIdentifying and removing malicious insiders from a network is a topic of active research. Vehicular ad hoc networks (VANETs) may suffer from insider attacks; that is, an attacker may use authorized vehicles to attack other vehicles. Specifically, ...
Securing Vehicular Networks Using Deterministic Schemes for Computing Trust
INCOS '12: Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative SystemsVehicular ad-hoc networks (VANETs) have a big potential to improve traffic conditions. However, they are exposed to security threats that influence their reliability because they use an open medium for communication. We propose a trust based security ...
Accurate data aggregation for VANETs
VANET '07: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networksData aggregation is an important issue for vehicular ad-hoc networks (VANETs). Congestion notification applications are built to warn drivers of traffic slowdowns far enough in advance that the drivers may take alternate routes. Data that is broadcast ...
Comments