Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i

  • Authors:
  • Floriano De Rango;Dionigi Cristian Lentini;Salvatore Marano

  • Affiliations:
  • Department of Electronics Informatics and Systems (D.E.I.S.), University of Calabria, Rende, Cosenza, Italy;Department of Electronics Informatics and Systems (D.E.I.S.), University of Calabria, Rende, Cosenza, Italy;Department of Electronics Informatics and Systems (D.E.I.S.), University of Calabria, Rende, Cosenza, Italy

  • Venue:
  • EURASIP Journal on Wireless Communications and Networking
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outlined. The last phase of the authentication process, represented by the 4-way handshake procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.