skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks
Current data-driven intelligent transportation systems are mainly reliant on IEEE 802.11p to collect and exchange information. Despite promising performance of IEEE 802.11p in providing low-latency communications, it is still vulnerable to jamming attacks due to the lack of a PHY-layer countermeasure technique in practice. In this paper, we propose JammingBird, a novel receiver design that tolerates strong constant jamming attacks. The enablers of JammingBird are two MIMO-based techniques: Jamming-resistant synchronizer and jamming suppressor. Collectively, these two new modules are able to detect, synchronize, and recover desired signals under jamming attacks, regardless of the PHY-layer technology employed by the jammers. We have implemented JammingBird on a vehicular testbed and conducted extensive experiments to evaluate its performance in three common vehicular scenarios: Parking lots (0~15 mph), local traffic areas (25~45 mph), and highways (60~70 mph). In our experiments, while the jamming attacks degrade the throughput of conventional 802.11p-based receivers by 86.7%, JammingBird maintains 83.0% of the throughput on average. Experimental results also show that JammingBird tolerates the jamming signals with 25 dB stronger power than the desired signals.  more » « less
Award ID(s):
1950171 2113618 2100112 1949753
PAR ID:
10290269
Author(s) / Creator(s):
; ; ; ;
Date Published:
Journal Name:
2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Page Range / eLocation ID:
1 to 9
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks. Since each ZigBee network uses hop-by-hop network-layer message authentication based Yanchao Zhang Arizona State University Star E E Tree E E R E Mesh E E R E E E on a common network key, it is highly vulnerable to packetC E injection attacks, in which the adversary exploits the compromised network key to inject arbitrary fake packets from any spoofed address to disrupt network operations and conCoordinator C R E sume the network/device resources. In this paper, we present PhyAuth, a PHY hop-by-hop message authentication frameE E C R R E E E R R C R E E Router E E E End Device Figure 1: ZigBee network topologies. work to defend against packet-injection attacks in ZigBee networks. The key idea of PhyAuth is to let each ZigBee E The coordinator acts as a central node responsible for mantransmitter embed into its PHY signals a PHY one-time password (called POTP) derived from a device-specific secret key and an efficient cryptographic hash function. An authentic POTP serves as the transmitter’s PHY transmission permission for the corresponding packet. PhyAuth provides three schemes to embed, detect, and verify POTPs based on different features of ZigBee PHY signals. In addition, PhyAuth involves lightweight PHY signal processing and no change to the ZigBee protocolstack. Comprehensive USRP experiments confirm that PhyAuth can efficiently detect fake packets with very low false-positive and false-negative rates while having a negligible negative impact on normal data transmissions. 
    more » « less
  2. Henderson, Thomas; Imputato, Pasquale; Liu, Yuchen; Gamess, Eric (Ed.)
    Physical (PHY) layer abstraction is an effective method to reduce the runtimes compared with link simulations but still accurately characterize the link performance. As a result, PHY layer abstraction for IEEE 802.11 WLAN and 3GPP LTE/5G has been widely configured in the network simulators such as ns-3, which achieve faster system-level simulations quantifying the network performance. Since the first publicly accessible 5G NR Sidelink (SL) link simulator has been recently developed, it provides a possibility of implementing the first PHY layer abstraction on 5G NR SL. This work deploys an efficient PHY layer abstraction method (i.e., EESM-log-SGN) for 5G NR SL based on the offline NR SL link simulation. The obtained layer abstraction which is further stored in ns-3 for use aims at the common 5G NR SL scenario of OFDM unicast single layer mapping in the context of Independent and Identically Distributed (i.i.d.) frequency-selective channels. We provide details about implementation, performance, and validation. 
    more » « less
  3. This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply our methodology to 4G LTE downlink by considering each control channel as a subsystem. We also develop open-source software enabling research and education using software-defined radios. We present experimental results with open-source LTE systems and shows how the different subsystems behave under targeted interference. The analysis for the LTE downlink shows that the synchronization signals (PSS/SSS) are very resilient to interference, whereas the downlink pilots or Cell-Specific Reference signals (CRS) are the most susceptible to a synchronized protocol-aware interferer. We also analyze the severity of control channel attacks for different LTE configurations. Our methodology and tools allow rapid evaluation of the PHY layer reliability in harsh signaling environments, which is an asset to improve current standards and develop new and robust wireless protocols. 
    more » « less
  4. Abstract Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day lives. Jamming mitigation techniques are predominately evaluated through simulation or with hardware for very specific jamming conditions. In this paper, an experimental software defined radio‐based RF jamming mitigation platform which performs online jammer classification and leverages reconfigurable beam‐steering antennas at the physical layer is introduced. A ray‐tracing emulation system is presented and validated to enable hardware‐in‐the‐loop jamming experiments of complex outdoor and mobile site‐specific scenarios. Random forests classifiers are trained based on over‐the‐air collected data and integrated into the platform. The mitigation system is evaluated for both over‐the‐air and ray‐tracing emulated environments. The experimental results highlight the benefit of using the jamming mitigation system in the presence of active jamming attacks. 
    more » « less
  5. Underwater networks of wireless sensors deployed along the coast or in the deep water are the most promising solution for the development of underwater monitoring, exploration and surveillance applications. A key feature of underwater networks that can significantly enhance current monitoring applications is the ability to accommodate real-time video information on an underwater communication link. In fact, while today monitoring relies on the exchange of simple discrete information, e.g., water temperature, and particle concentration, among others, by introducing real-time streaming capability of non-static images between wireless underwater nodes one can completely revolutionize the whole underwater monitoring scenario. To achieve this goal, underwater links are required to support a sufficiently high data rate, compatible with the streaming rates of the transmitted video sequence. Unfortunately, the intrinsic characteristic of the underwater propagation medium has made this objective extremely challenging. In this paper, we present the first physical layer transmission scheme for short-range and high-data rate ultrasonic underwater communications. The proposed solution, which we will refer to as Underwater UltraSonar (U2S), is based on the idea of transmitting short information-bearing carrierless ultrasonic signals, e.g., pulses, following a pseudo-random adaptive time-hopping pattern with a superimposed rate-adaptive Reed-Solomon forward error correction (FEC) channel coding. We also present the design of the first prototype of a software-defined underwater ultrasonic transceiver that implements U2S PHY transmission scheme through which we evaluate the U2S performance in real-scenario underwater experiments at the PHY layer, i.e., Bit Error Rate (BER) extensively, and at the application layer, i.e., structural similarity (SSIM) index. Results show that U2S links can support point-to-point data rate up to 1.38 Mbps and that by leveraging the flexibility of the adaptive time-hopping and adaptive channel coding techniques, one can trade between link throughput and energy consumption, still satisfying application layer requirements. 
    more » « less