Security vulnerability and countermeasures of frequency offset correction in 802.11a systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Frequency offset (FO) is an inherent feature of wireless communications. It results from differences in the operating frequency of different radio oscillators. Failure to compensate for the FO may lead to a decoding failure, particularly in OFDM systems. IEEE 802.11a/g systems use a globally known preamble to deal with this issue. In this paper, we demonstrate how an adversary can exploit the structure and publicity of 802.11a's frame preamble to launch a low-power reactive jamming attack against the FO estimation mechanism. In this attack, the adversary will need to quickly detect a PHY frame and subsequently distort the FO estimation mechanism, irrespective of the channel conditions. By employing a fast frame detection technique, and optimizing the energy and structure of the jamming signal, we show the feasibility of such an attack. Furthermore, we propose some mitigation techniques and evaluate one of them through simulations and USRP testbed experimentation.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1015-1023
Number of pages9
ISBN (Print)9781479933600
DOIs
StatePublished - 2014
Event33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014 - Toronto, ON, Canada
Duration: Apr 27 2014May 2 2014

Other

Other33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014
CountryCanada
CityToronto, ON
Period4/27/145/2/14

Fingerprint

Jamming
Testbeds
Reactive power
Orthogonal frequency division multiplexing
Decoding
Communication

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Rahbari, H., Krunz, M. M., & Lazos, L. (2014). Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. In Proceedings - IEEE INFOCOM (pp. 1015-1023). [6848031] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INFOCOM.2014.6848031

Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. / Rahbari, Hanif; Krunz, Marwan M; Lazos, Loukas.

Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., 2014. p. 1015-1023 6848031.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rahbari, H, Krunz, MM & Lazos, L 2014, Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. in Proceedings - IEEE INFOCOM., 6848031, Institute of Electrical and Electronics Engineers Inc., pp. 1015-1023, 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014, Toronto, ON, Canada, 4/27/14. https://doi.org/10.1109/INFOCOM.2014.6848031
Rahbari H, Krunz MM, Lazos L. Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. In Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc. 2014. p. 1015-1023. 6848031 https://doi.org/10.1109/INFOCOM.2014.6848031
Rahbari, Hanif ; Krunz, Marwan M ; Lazos, Loukas. / Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. Proceedings - IEEE INFOCOM. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 1015-1023
@inproceedings{0ab5eb27d8c54fe4ae0176a262cc8464,
title = "Security vulnerability and countermeasures of frequency offset correction in 802.11a systems",
abstract = "Frequency offset (FO) is an inherent feature of wireless communications. It results from differences in the operating frequency of different radio oscillators. Failure to compensate for the FO may lead to a decoding failure, particularly in OFDM systems. IEEE 802.11a/g systems use a globally known preamble to deal with this issue. In this paper, we demonstrate how an adversary can exploit the structure and publicity of 802.11a's frame preamble to launch a low-power reactive jamming attack against the FO estimation mechanism. In this attack, the adversary will need to quickly detect a PHY frame and subsequently distort the FO estimation mechanism, irrespective of the channel conditions. By employing a fast frame detection technique, and optimizing the energy and structure of the jamming signal, we show the feasibility of such an attack. Furthermore, we propose some mitigation techniques and evaluate one of them through simulations and USRP testbed experimentation.",
author = "Hanif Rahbari and Krunz, {Marwan M} and Loukas Lazos",
year = "2014",
doi = "10.1109/INFOCOM.2014.6848031",
language = "English (US)",
isbn = "9781479933600",
pages = "1015--1023",
booktitle = "Proceedings - IEEE INFOCOM",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Security vulnerability and countermeasures of frequency offset correction in 802.11a systems

AU - Rahbari, Hanif

AU - Krunz, Marwan M

AU - Lazos, Loukas

PY - 2014

Y1 - 2014

N2 - Frequency offset (FO) is an inherent feature of wireless communications. It results from differences in the operating frequency of different radio oscillators. Failure to compensate for the FO may lead to a decoding failure, particularly in OFDM systems. IEEE 802.11a/g systems use a globally known preamble to deal with this issue. In this paper, we demonstrate how an adversary can exploit the structure and publicity of 802.11a's frame preamble to launch a low-power reactive jamming attack against the FO estimation mechanism. In this attack, the adversary will need to quickly detect a PHY frame and subsequently distort the FO estimation mechanism, irrespective of the channel conditions. By employing a fast frame detection technique, and optimizing the energy and structure of the jamming signal, we show the feasibility of such an attack. Furthermore, we propose some mitigation techniques and evaluate one of them through simulations and USRP testbed experimentation.

AB - Frequency offset (FO) is an inherent feature of wireless communications. It results from differences in the operating frequency of different radio oscillators. Failure to compensate for the FO may lead to a decoding failure, particularly in OFDM systems. IEEE 802.11a/g systems use a globally known preamble to deal with this issue. In this paper, we demonstrate how an adversary can exploit the structure and publicity of 802.11a's frame preamble to launch a low-power reactive jamming attack against the FO estimation mechanism. In this attack, the adversary will need to quickly detect a PHY frame and subsequently distort the FO estimation mechanism, irrespective of the channel conditions. By employing a fast frame detection technique, and optimizing the energy and structure of the jamming signal, we show the feasibility of such an attack. Furthermore, we propose some mitigation techniques and evaluate one of them through simulations and USRP testbed experimentation.

UR - http://www.scopus.com/inward/record.url?scp=84904438202&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84904438202&partnerID=8YFLogxK

U2 - 10.1109/INFOCOM.2014.6848031

DO - 10.1109/INFOCOM.2014.6848031

M3 - Conference contribution

AN - SCOPUS:84904438202

SN - 9781479933600

SP - 1015

EP - 1023

BT - Proceedings - IEEE INFOCOM

PB - Institute of Electrical and Electronics Engineers Inc.

ER -