Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems
- Publication Type:
- Conference Proceeding
- Citation:
- 2016 IEEE Conference on Communications and Network Security, CNS 2016, 2017, pp. 118 - 126
- Issue Date:
- 2017-02-21
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
Rolling preambles Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems.pdf | Published version | 182.42 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
© 2016 IEEE. Modern wireless systems and standards increasingly rely on OFDM for high-throughput communications. However, these systems are often highly vulnerable to selective jamming attacks, particularly when a jammer targets (part of) the known frame preamble. In this paper, we consider one of the most disruptive jamming attacks against the preamble-based frequency offset (FO) estimation in IEEE 802.11a/n/ac/ax systems and develop four techniques to mitigate this attack. Two of these techniques are based on randomly changing the first half of the standard frame preamble at the transmitter while maintaining its backward compatibility with legacy receivers. Specifically, we design a set of new preamble waveforms that satisfy the expected characteristics of a preamble in 802.11 systems. The other two techniques take a receiver-based approach and exploit the parts of the preamble that are not under attack to estimate the FO. We conduct extensive simulations and illustrative USRP experiments to study the effectiveness of these countermeasures.
Please use this identifier to cite or link to this item: