Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks

Published: 01 September 2009 Publication History

Abstract

IEEE 802.11 access points deployed in shopping malls, university campuses, crowded streets, airports, and many other locations provide ubiquitous Internet access to millions of stations. However, these hot spots are vulnerable to Denial-of-Service (DoS) attacks due to the broadcast nature of wireless communication. It does not require specialized hardware or particularly high level of experience to render 802.11 networks inoperable through DoS attacks. Standard off-the-shelf equipment is sufficient for a malicious station to disrupt the service between access points and stations. In this paper we present a systematic survey of DoS attacks, which exploits MAC and physical layer vulnerabilities of 802.11 networks. Available countermeasures against DoS attacks are discussed and compared. Future research directions and open issues are also discussed.

References

[1]
Fleck, B. and Dimov, J., Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network. In: White Paper,
[2]
Faria, D.B. and Cheriton, D.R., DoS and authentication in wireless public access networks. In: Proceedings of the 3rd International Conference on Web Information Systems Engineering (WiSe'02), pp. 47-56.
[3]
He, C. and Mitchell, J.C., Security analysis and improvements for IEEE 802.11i. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS'05), pp. 90-110.
[4]
Bernaschi, N., Ferreri, F. and Valcamonici, L., "Access points vulnerabilities to DoS attacks in 802.11 networks". In: Wireless Networks, pp. 634-638.
[5]
Bellardo, J. and Savage, S., 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In: Proceedings of USENIX Security Symposium,
[6]
Raya, M., Aad, I., Hubaux, J.P. and El Fawal, A., DOMINO: detecting MAC layer greedy behavior in 802.11 hotspots. IEEE Transactions on Mobile Computing. v5. 1691-1705.
[7]
Yamasaki, R., Ogino, A., Tamaki, T., Uta, T., Matsuzawa, N. and Kato, T., TDOA location system for 802.11b WLAN. In: Proceedings of the IEEE WCNC, pp. 2338-2343.
[8]
Gummadi, R., Wetherall, D., Greenstein, B. and Seshan, S., Understanding and mitigating the impact of RF interference on 802.11 networks. In: Proceedings of the ACM SIGCOMM, pp. 385-396.
[9]
Lin, G. and Noubir, G., On link layer denial of service in data wireless LANs. Wiley Journal on Wireless Communications and Mobile Computing. v5. 273-284.
[10]
Xu, W., Ma, K., Trappe, W. and Zhang, Y., Jamming in sensor networks: attack and defense strategies. IEEE Network. v20. 41-47.
[11]
Faria, D.B. and Cheriton, D.R., Detecting identity-based attacks in wireless networks using signalprints. In: Proceedings of the 5th ACM Workshop on Wireless Security, pp. 43-52.
[12]
Ureten, O. and Serinken, N., Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering. v32. 27-33.
[13]
Azimi-Sadjadi, B., Kiayias, A., Mercado, A. and Yener, B., Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 401-410.
[14]
Wright, J., How 802.11w Will Improve Wireless Security. 05/29/2006.
[15]
Wright, J., Detecting wireless LAN MAC address spoofing. In: white paper,
[16]
RFC 5201 - Host Identity Protocol (HIP), available at http://www.ietf.org/rfc/rfc5201.txt.
[17]
Martinovic, I., Zdarsky, F.A., Wilhelm, M., Wegmann, C. and Schmitt, J.B., Wireless client puzzles in IEEE 802.11 networks: security by wireless. In: Proceedings of the First ACM Conference on Wireless Network Security (WISEC 2008), pp. 36-45.
[18]
Guo, F. and Chiueh, T., Sequence number-based MAC address spoof detection. In: LNCS, vol. 3858. Springer. pp. 309-329.
[19]
Kyasanur, P. and Vaidya, N.H., Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing. v4 i5. 502-516.
[20]
Stone-Gross, B., Wilson, C., Almeroth, K.C., Belding, E.M., Zheng, H. and Papagiannaki, K., Malware in IEEE 802.11 wireless networks. In: LNCS, 4979. Springer. pp. 222-231.

Cited By

View all
  • (2023)Framing framesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620241(53-68)Online publication date: 9-Aug-2023
  • (2022)Security Control of Denial-of-Service Attacks in Cyber-Physical Systems Based on Dynamic FeedbackComputational Intelligence and Neuroscience10.1155/2022/54721372022Online publication date: 1-Jan-2022
  • (2022)Intrusion detection based on machine learning in the internet of things, attacks and counter measuresThe Journal of Supercomputing10.1007/s11227-021-04188-378:6(8890-8924)Online publication date: 1-Apr-2022
  • Show More Cited By
  1. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Computer Standards & Interfaces
      Computer Standards & Interfaces  Volume 31, Issue 5
      September, 2009
      176 pages

      Publisher

      Elsevier Science Publishers B. V.

      Netherlands

      Publication History

      Published: 01 September 2009

      Author Tags

      1. Denial-of-Service
      2. IEEE 802.11
      3. Interference
      4. Jamming
      5. MAC
      6. Security

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 28 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Framing framesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620241(53-68)Online publication date: 9-Aug-2023
      • (2022)Security Control of Denial-of-Service Attacks in Cyber-Physical Systems Based on Dynamic FeedbackComputational Intelligence and Neuroscience10.1155/2022/54721372022Online publication date: 1-Jan-2022
      • (2022)Intrusion detection based on machine learning in the internet of things, attacks and counter measuresThe Journal of Supercomputing10.1007/s11227-021-04188-378:6(8890-8924)Online publication date: 1-Apr-2022
      • (2019)JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi InterferenceProceedings of the 2019 International Conference on Embedded Wireless Systems and Networks10.5555/3324320.3324331(83-94)Online publication date: 25-Feb-2019
      • (2019)Towards a Security Architecture for Hybrid WMNsProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3340106(1-10)Online publication date: 26-Aug-2019
      • (2019)A Data Parasitizing Scheme for Effective Health Monitoring in Wireless Body Area NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2018.283077918:1(13-27)Online publication date: 1-Jan-2019
      • (2017)Introducing IJam Wireless De-authentication Attack ToolProceedings of the 2017 ACM Southeast Conference10.1145/3077286.3077316(199-202)Online publication date: 13-Apr-2017
      • (2017)LTE PHY layer vulnerability analysis and testing using open-source SDR toolsMILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM.2017.8170787(744-749)Online publication date: 23-Oct-2017
      • (2017)Jammer Localization in Multi-Hop Wireless Network: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2016.263114619:2(765-799)Online publication date: 2-Jun-2017
      • (2017)Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access PointMobile Networks and Applications10.1007/s11036-016-0753-122:5(834-843)Online publication date: 1-Oct-2017
      • Show More Cited By

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media