A Solution to WLAN Authentication and Association DoS Attacks
نویسنده
چکیده
-The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security standard, 802.11i, addresses most issues on user authentication and data encryption; however, it does not protect WLANs against Denial of Service (DoS) attacks. This paper presents a solution to detect and resolve authentication request flooding (AuthRF) and association request flooding (AssRF). We developed an experimental framework to demonstrate and quantify AuthRF and AssRF attacks against TCP and wireless Voice over IP (WVoIP) communications. Our study shows that such attacks can be easily launched, and cause service disruption. We then implement a solution based on traffic pattern analysis and filtering to resolve and prevent AuthRF and AssRF attacks. This solution is validated by empirical data.
منابع مشابه
Inhibition of Denial of Service Attack in WLAN using Integrated Central Manager
Denial of Service (DoS) attack is a major problem prevalent in Wireless Local Area Network (WLAN). Many security techniques were introduced to prevent the DoS attacks in WLAN. However, there are still many weaknesses which provide interest and way for hackers to do such attacks. This research mainly deals with the two types of DoS attacks, namely EAPOL (Extensible Authentication Protocol over L...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملSecurity Analysis and Improvements on WLANs
IEEE 802.11i standard defines the security specifications of IEEE 802.11 series Wireless Local Area Network (WLAN). It is the replacement of the old security standard named Wired Equivalent Privacy (WEP), and it aims to eliminate all known attacks against WEP. It certainly provides solutions to the confidentiality, mutual authentication and integrity aspects of the WLAN security but not the ava...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007