Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Wi-Fi networks are often susceptible to signal interference that can disrupt services, intercept sensitive data, and allow unauthorized access. Exploiting this vulnerability, attackers can launch Intentional Electromagnetic Interference (IEMI) attacks or protocol-based attacks. IEMI attacks include, but are not limited to, jamming, which involves the introduction of interference signals in the frequency band used by a given Wi-Fi network, thus disrupting its proper operation. The article presents research on different types of IEMI attacks, aimed at illustrating this type of threat to video transmission from Wi-Fi cameras and discusses methods of protection against this type of attack. The paper examines the methods of jamming the wireless network band, which are used on the distribution methods and the Sweeping Jammer methods that cyclically disrupt all available devices. Based on the experiments, it has been confirmed that SOHO devices are highly susceptible to this type of simple attacks and implementing a method to minimize the effects of jamming yields poor results. The simplicity of this type of attack and the high availability of software and hardware tools on the market make the threat highly popular and still dangerous.
Słowa kluczowe
Czasopismo
Rocznik
Strony
58--65
Opis fizyczny
Bibliogr. 29 poz., rys., tab.
Twórcy
autor
- The Jacob of Paradies University in Gorzów Wielkopolski, The Jacob of Paradies University in Gorzów Wielkopolski, Faculty of Technology
autor
- Technical University of Applied Sciences Wildau Hochschulring
autor
- The Jacob of Paradies University in Gorzów Wielkopolski, The Jacob of Paradies University in Gorzów Wielkopolski, Faculty of Technology
Bibliografia
- 1. Franke U. War by non-military means. Understanding Russian information warfare. Sztokholm. 2015. pp. 32. Accesed 04.02.2024. https://www.foi.se/rest-api/report/FOI-R---4065---SE.
- 2. Tahar M, Abdelmadjid Z. Wi-Fi security analysis. Proceedings of the International Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015).Vol.73. Tunisia. 2015: 172-178. doi: 10.1016/j.procs.2015.12.009.
- 3. Gąska W, Mrozeka M, Tańskib T. Propagation of electromagnetic waves in wireless networks in rooms made of different engineering materials/Rozchodzenie się fal elektromagnetycznych w sieciach bezprzewodowych w pomieszczeniach wykonanych z różnych materiałów inżynierskich. Journals of student research clubs. Politechnika Śląska, Gliwice 2019.
- 4. Bayraktaroglu E., King C., Liu X., Noubir G., Rajaraman R., Thapa B. On the performance of IEEE 802.11 under jamming. Proc. IEEE INFOCOM 27th Conf. Comput. Commun. 2008 doi: 10.1109/INFOCOM.2008.183
- 5. Orakcal C, Starobinski D. Jamming-resistant rate adaptation in Wi-Fi networks. Perform Evaluation. 2014;75-76:50-68. doi:10.1016/j.peva.2014.02.002
- 6. Zahra F, Bostancil Y, Soyturk M. Real-Time Jamming Detection in Wireless IoT Networks. IEEE. 2023. 10.1109/ACCESS.2023.3293404.
- 7. Rozporządzenie Rady Ministrów z dnia 24 kwietnia 2017 r. Zmieniające rozporządzenie w sprawie krajowej tablicy przeznaczeń częstotliwości, Dz.U. 2017 poz. 920.
- 8. Introduction to Wireless LAN Measurements. Accessed 16.04.2024. https://docslib.org/doc/6622136/introduction-to-wireless-lan-measurements.
- 9. Introduction to Wireless LAN Measurements From 802.11a to 802.11. Acaccessed 16.04.2024. https://download.ni.com/evaluation/rf/Introduction_to_WLAN_Testing.pdf.
- 10. Lemieszewski Ł. Cybersecurity of satellite navigation based on gnss spoofing detection/Cyberbezpieczeństwo nawigacji satelitarnej na podstawie systemów wykrywania spoofingu GNSS. Gorzów Wielkopolski. 2022. Accessed 2.04.2024. http://cwn.ajp.edu.pl/2023/50/2/.
- 11. Chowdhury K. R, Akyildiz I. Interferer classification, channel selection and transmission adaptation for wireless sensor networks. IEEE. 2009.doi: 10.1109/ICC.2009.5199098
- 12. Kodeks Karny, art. 269a, Dz.U.2024.0.17.
- 13. Manesh RM, Quadri A, Subramaniam S, Kaabouch N. An optimized SNR estimation technique using particle swarm optimization algorithm. IEEE Annual Computing and Communication Workshop and Conference (CCWC). Las Vegas, NV, USA. 2017: 1-6. doi: 10.1109/CCWC.2017.7868387.
- 14. Benslimane A, Yakoubi A, Bouhorma M. Analysis of Jamming Effects on IEEE 802.11 Wireless Networks. IEEE International Conference on Communications. 2011.doi: 10.1109/icc.2011.5962627.
- 15. Grover K, Lim A, Yang Q. Jamming and antianti-jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing. 2014; 17 (4):197-215. doi: doi.org/10.1504/IJAHUC.2014.066419
- 16. Sârbu A, Neagoie D. Wi-Fi jamming using software defined radio. International Conference Knowledge-Based Organization. 2020; XXVI (3). doi: :10.2478/kbo-2020-0132.
- 17. Grover K, Lim A, Yang Q. Jamming and antianti-jamming techniques in wireless networks: a survey, International Journal of Ad Hoc and Ubiquitous Computing. 2014; 17 (4): 197-215. doi: 10.1504/IJAHUC.2014.066419
- 18. Karunambiga K, Sumathi M, Sundarambal M. Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network. International Conference on Soft-Computing and Networks Security (ICSNS). IEEE. 2015. doi: 10.1109/ICSNS.2015.7292430
- 19. Duarte G. Software Defined Radio for Wi-Fi Jamming. 2016. https://doi.org/10.13140/RG.2.2.23772.90240
- 20. Liangxiao X., Starobinski D. Cascading Attacks on Wi-Fi Networks with Weak Interferers. 2018. doi: 10.1145/3242102.3242142
- 21. Jie Z, Gang W, Xiaowei Y. Comparative Analysis of Sweeping Frequency Jamming and Non-sweeping Frequency Jamming in Partial-band Jamming Based on Projectile-carried Communication Jamming. IEEE 20th International Conference on Communication Technology (ICCT). 2020. doi: 10.1109/ICCT50939.2020.9295755
- 22. Liu G, Liu J, Li Y, Xiao L, Tang Y. Jamming Detection of Smartphones for WiFi Signals. 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).Glasgow. 2015: 1-3. doi: 10.1109/VTCSpring.2015.7145895
- 23. SPECTRAN – Aaronia Spectrum Analyzer. Accessed 16.04.2024. https://aaronia.com/en/produkte/spectrum-analyzer
- 24. GNU Radio – Main Page. Accessed 16.04.2024. https://wiki.gnuradio.org/
- 25. GREAT SCOTT GADGETS – HackRF Product Line. Accessed 16.04.2024. https://greatscottgadgets.com/hackrf/
- 26. Wei X, Wang Q, Wang T, Fan J. Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey. in IEEE Communications Surveys & Tutorials. 2017; 19 (2): 765-799. doi: 10.1109/COMST.2016.2631146
- 27. Adejumola R. "What Are Disassociation Attacks?". Accessed 16.04.2024. https://www.makeuseof.com/what-are-disassociation-attacks/
- 28. Lu Z, Wang W, Wang C. X. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.” IEEE Transactions on Mobile Computing. 2014;13:1746-1759. doi: 10.1109/TMC.2013.146
- 29. Lemieszewski Ł, Kowalski M, Jędza A. Methods of securing 802.11 wireless networks and assessing their vulnerability to attacks. In: Radomska-Zalas A, Becker J, Lemieszewski Ł, eds. Modern technologies in industry. IT innovations. Jacob of Paradyż Academy in Gorzów Wielkopolski. 2022:59-72. Accessed 1.12.2023. http://cwn.ajp.edu.pl/2023/27/60/
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e6163e89-bcb8-428b-ac95-fc5c724c494f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.