Journal
PERFORMANCE EVALUATION
Volume 75-76, Issue -, Pages 50-68Publisher
ELSEVIER SCIENCE BV
DOI: 10.1016/j.peva.2014.02.002
Keywords
IEEE 802.11; Denial of service; Rate control
Funding
- U.S. National Science Foundation [CCF-0916892, CNS-1012910]
Ask authors/readers for more resources
We introduce a theoretical framework to formally analyze the vulnerability of IEEE 802.11 rate adaptation algorithms (RAAs) to selective jamming attacks, and to develop countermeasures providing provable performance guarantees. Thus, we propose a new metric called Rate of Jamming (RoJ), wherein a low RoJ implies that an RAA is highly vulnerable to jamming attacks, while a high RoJ implies that the RAA is resilient. We prove that several state-of-the-art RAAs, such as ARF and SampleRate, have a low RoJ (i.e., 10% or lower). Next, we propose a robust RAA, called Randomized ARF (RARF). Using tools from renewal theory, we derive a closed-form lower bound on the RoJ of RARF. We validate our theoretical analysis using ns-3 simulations and show that the minimum jamming rate required against RARF is about 33% (i.e., at least three times higher than the RoJ of other RAAs). (C) 2014 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available