Study on methods to counter-measure IEEE 802.11 standard Wifi signals below 6 GHz
DOI:
https://doi.org/10.54654/isj.v2i19.980Keywords:
information security, Wifi, jamming, Wifi router, standardTóm tắt
Abstract—Launched in 1980 according to the IEEE 802.11 standard, Wifi (Wireless Fidelity) wireless network supports the expansion of wired networks and has gradually become an important component of telecommunications infrastructure in society. Currently, Wifi network infrastructure is becoming increasingly important as its application has helped quickly connect to information sources, capture events and news effectively. However, the Wifi network has been exploited to conduct espionage, terrorism, sabotage, and criminal acts such as illegally collecting information, locating relatively accurate locations, and controlling remotely, illegally collecting information, terrorist attacks, especially distorted propaganda and incitement against the Party and Government of Vietnam by hostile forces and criminal organizations that affect national security, causing information insecurity that frequently occurs in sensitive event protection areas. In this article, the authors focus on researching a number of methods to jam Wifi signals in sensitive event protection areas to propose the most appropriate solution to promptly handle and prevent incidents from occurring bad situations arise.
Downloads
References
. https://en.wikipedia.org/wiki/IEEE_802.11.
. IEEE standard for information technology–telecommunications and information exchange between systems—local and metropolitan area networks–specific requirements–part 11, (2013). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications–amendment 4: Enhancements for very high throughput for operation in bands below 6 GHz.,” IEEE Std 802.11ac(TM), pp. 1–425.
. K. Grover, A. Lim, and Q. Yang, (2014) Jamming and anti-jamming techniques in wireless networks: a survey, International Journal of Ad Hoc and Ubiquitous Computing, vol. 17, no. 4, pp. 197–215.
. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, (2010), Denial of service attacks in wireless networks: The case of jammers, IEEE Communications surveys & tutorials, vol. 13, no. 2, pp. 245–257.
. I. Broustis, K. Pelechrinis, D. Syrivelis, S. V. Krishnamurthy, and L. Tassiulas, (2009), FIJI: Fighting implicit jamming in 802.11 WLANs, Proceedings of International Conference on Security and Privacy in Communication Systems, pp. 21–40, Springer.
. E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, (2013), Performance of IEEE 802.11 under jamming, Mobile Networks and Applications, vol. 18, no. 5, pp. 678–696.
. Y. Cai, K. Pelechrinis, X. Wang, P. Krishnamurthy, and Y. Mo, (2013), Joint reactive jammer detection and localization in an enterprise Wifi network, Computer Networks, vol. 57, no. 18, pp. 3799–3811.
. S. Bandaru, (2014), Investigating the effect of jamming attacks on wireless LANs, International Journal of Computer Applications, vol. 99, no. 14, pp. 5–9.
. C. Shahriar, M. La Pan, M. Lichtman, T. C. Clancy, R. McGwier, R. Tandon, S. Sodagari, and J. H. Reed, (2014), PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 292–314.
. M. J. La Pan, T. C. Clancy, and R. W. McGwier, (2012), Jamming attacks against OFDM timing synchronization and signal acquisition, Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–7.
. M. J. La Pan, T. C. Clancy, and R. W. McGwier, (2016), Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security, Wireless Communications and Mobile Computing, vol. 16, no. 2, pp. 177–191.
. E. Perahia and R. Stacey, (2013), Next generation wireless LANs: 802.11n and 802.11ac. Cambridge university press.
. A. L. Scott, (2011), Effects of cyclic prefix jamming versus noise jamming in OFDM signals, Air Force Institute of Technology Graduate School of Engineering and Management.
. D. Thuente and M. Acharya, (2006), Intelligent jamming in wireless networks with applications to 802.11b and other networks, Proceedings of IEEE Military Communications Conference (MILCOM), vol. 6, p. 100.
. M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, (2004), Intelligent jamming in 802.11b wireless networks, Proceedings of OPNETWORK. Washington DC, USA: OPNET.
. R. Negi and A. Rajeswaran, (2005), DoS analysis of reservation based MAC protocols, Proceedings of IEEE International Conference on Communications (ICC), vol. 5, pp. 3632–3636.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).