6. Conclusion
In this paper, we examined the limitations of the existing jamming schemes against channel hopping WLAN devices in dense networks. Even though it is natural for malicious jammers to attempt to identify target nodes in dense networks, this has not been investigated in jamming attack scenarios thus far. Therefore, we proposed and developed a persistent jamming attack to track and jam the target devices based on the PAID and device fingerprints in the frame header. Furthermore, we evaluated the effectiveness of the jamming schemes through empirical experiments and demonstrated that persistent jamming can attack target nodes in dense networks even though they adapt the channel frequency to avoid jamming signals. The evaluation results confirm the superior effi- ciency of the persistent jamming strategy in a dense network environment in dense network conditions. Finally, we recommended effective anti-persistent jamming defense mechanisms to protect the PAID and device fingerprints. Almost all modern wireless communication systems have the same security limitation in the frame formats which have an unprotected frame header. For low latency and high efficiency, the frame headers are not encrypted in typical wireless systems. Thus, any device can decode the signal information and detect the device fingerprints. However, the frame headers of the modern wireless communication systems include more information for advanced wireless connectivity. If the frame header is not protected, a persistent jammer can track and jam, or an eavesdropper can track and overhear the communication. Therefore, in this paper, anti-tracking and anti-jamming defense mechanisms are proposed. The prototype experiment and network emulation results show that the proposed defenses are effective in mitigating harmful effects of the persistent jamming attack. As future work, we plan to apply the persistent jamming attack for other wireless networks to test the extendibility of its efficacy and investigate more efficient defense mechanisms against persistent jamming attacks in terms of complexity and defense performance.