RF Jamming Dataset Using CM4 and JamRF enabled HackRF

Citation Author(s):
Abubakar S.
Ali
Khalifa University of Science and Technology
Submitted by:
Abubakar Ali
Last updated:
Mon, 10/31/2022 - 11:23
DOI:
10.21227/mekj-vw56
Data Format:
Links:
License:
1
1 rating - Please login to submit your rating.

Abstract 

Future wireless networks must incorporate awareness, adaptability, and intelligence as fundamental building elements in order to meet the wide range of requirements of the next-generation communication systems. Wireless sensing techniques can be used to gather awareness from the radio signals present in the surroundings. However, threats from hostile attackers, such as jamming, eavesdropping, and manipulation, are also present along with this. This paper describes in detail an RF-jamming detection test-bed and provides experimentally measured data. The RF jamming detection test-bed, in particular, makes use of the spectral scan capability of wireless network interfaces and JamRF, a jamming toolkit. In order to facilitate future progress in the experimentation of jamming detection and avoidance systems, we explain the methodology used for the development of our test-bed and discuss the reasoning behind the choices made throughout its evolution. Furthermore, we provide various types of measurement data obtained with the test-bed. The data set is expected to facilitate and promote the experimental evaluation of jamming detection, jamming avoidance, and anti-jamming schemes developed by the wireless security community.

Instructions: 

The basic idea behind the test-bed is to carry out jamming based on JamRF \cite{Ali2022JamRF} implementation of a broadband jammer that can jam a portion of the spectrum there by disrupting or corrupting user data. Here, by employing the JamRF toolkit, we jam all the available 2.4/5GHz channels sequentially. We record measurements in three different environments namely; RF isolation chamber, laboratory, office. We carry out the jamming attack inside the RF isolation chamber to avoid disruption transmission activities of other users. We run a HackRF with JamRF to jam a certain frequency and then using the CM4 with a mounted Qualcomm Atheros device, we capture signals at the receiver-side using the background mode of scanning. We run one jammer at a time at different distances of {20, 40, 60}cm from the receiver, and different jamming transmit powers of {0, 5, 10}dBm. The receiver collects FFT samples from all supported channels. Furthermore, at each distance and power combination, we collect FFT samples for ~3 seconds, pause for ~10 seconds, and then repeat this process 10 more times. However, jamming attack is not carried out in 3 different scenarios: when measurement is carried out in the laboratory to simulate low activity, office to simulate high activity and inside the RF chamber to simulate no activity. The ATH10k and ATH9k driver configurations do not automatically enable spectral scan by default. Specifically enabling this feature in the kernel configuration using the CONFIG\_ATH10K\_SPECTRAL and CONFIG\_ATH9K\_COMMON\_SPECTRAL feature is required. Spectral data is captured using an open source tool\footnote{\url{https://github.com/govindsi/utilities/blob/main/scripts/spectral\_scan.sh}} utility under various configurations\footnote{\url{https://github.com/govindsi/utilities/tree/main/config/AP}}. Additionally, during the process of data capture, controlling the jamming signal such that it only affects one channel is the key problem for this experimental approach.

Comments

dataset

Submitted by Gangisetty Bhuvanesh on Fri, 09/08/2023 - 05:09