Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
802.11 Wireless Networks: The Definitive Guide
802.11 Wireless Networks: The Definitive Guide
802.11 network intrusion detection using genetic programming
GECCO '05 Proceedings of the 7th annual workshop on Genetic and evolutionary computation
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Active internet traffic filtering: real-time response to denial-of-service attacks
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A solution to spoofed PS-poll based denial of service attacks in IEEE 802.11 WLANs
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
IEEE 802.11 wireless network simulator using Verilog
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Improved security in IEEE 802.11 wireless LANs
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Hi-index | 0.00 |
Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, the Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999 which was widely accepted as the defacto industry standard for interconnection of portable devices. Due to the scarcity of battery power in portable devices operating in WLANs, IEEE 802.11 directly addressed the issue of Power Saving (PS) and defined a whole mechanism to allow stations (STA) to go into sleep mode without losing information, as Access Point (AP) keeps buffering the messages directed to the sleeping STA. Growing use of IEEE 802.11 lead to the identification of flaws in security specifications of the standard known as Wired Equivalent Privacy (WEP). These flaws were addressed by the introduction of amendments/enhancements. However, IEEE's security enhancements failed to achieve desired objectives especially availability, which is the main concern of any network administrator. Identity theft due to unauthenticated management and control frames left a window open for hackers to launch successful Denial of Service (DoS) attacks. The PS functions of 802.11 present several identity based vulnerabilities, exploiting which, an attacker can spoof a polling message on behalf of STA and cause AP to discard buffered packets of the client while it is asleep. As a result, an attacker can block victim STA from receiving frames from AP, thus launching a successful DoS attack. The mechanism proposed in [1] addresses the issue of spoofed PS-Poll based DoS attack and proposes a robust solution to this problem. Although the proposed solution was a novel idea; however it was only a mathematical analysis, not verified or tested by implementation on hardware or through simulation. In this extended version of the paper, an endeavor has been made to implement the theoretical idea and validate the mathematical calculations through simulation.