Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
نویسندگان
چکیده
In this paper, we focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we deal with some hidden vulnerabilities based on the control packets CTS (Clear to Send) and ACK. Through these vulnerabilities, we show two new smart attacks which were not dealt by the solutions proposed recently like the attack based on the RTS (Request to Send) packet vulnerability. The malicious node can exploit these vulnerabilities on the MAC protocol, in order to corrupt the monitoring and routing processes. Furthermore, we demonstrate the attacks through algorithms and we show how vulnerabilities can be exploited and how these attacks can be implemented by the attacker. The impact of these attacks is presented through simulation and implementation. Simulation and exprimental results show the impact of the attacks on the network. In addition, the experimental results demonstrate the feasibility of these real attacks and their exploitation. These experimentations allow us to confirm the simulation’s results. Furthermore, in order to prevent these attacks, the solutions based on control packet authentication are presented. We propose two kinds of the solution one is cryptography independent and the other one is cryptography dependent. The evaluation and analysis of these solutions are investigated by analytic and simulations analysis. The simulations’ results of the proposed solution show that the attacks are prevented and the negative impacts are significantly reduced. In addition, the security cost of the proposed solutions are investigated. Hence, the security costs are insignificant in comparison with the negative impact of these attacks. Copyright c © 2008 John Wiley & Sons, Ltd.
منابع مشابه
Infrastructure-Based MAC in Wireless Mobile Ad-Hoc Networks
The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Function (PCF), defined in the standard, cannot be readily used. This is due to the fact that there is no central authority to act as a Point Coordinator (PC). Peer-to-peer ad-hoc mode in the IEEE 802.11 standard only imple...
متن کاملPerformance analysis of CSMA and IEEE 802.11 in Wireless Sensor Networks using GloMoSim and IEEE 802.11as a gimmick
Since its birth wireless communication became an indispensible part of the modern society. One major area that has a gigantic impact on the performance of wireless sensor networks (WSNs) is the Medium Access Control (MAC) layer. Many random access protocols exist in wireless sensor networks. Some of these protocols include Carrier Sense Multiple Access (CSMA), Multiple Access with Collision Avo...
متن کاملIEEE 802.11 Wireless Network Simulator Using Verilog
This paper presents a basic IEEE 802.11 network simulator using Verilog. Basic aim of this paper was to design a simulator using a hardware description language (HDL) such as Verilig, since the functions and protocols described in a state machines are best simulated using a HDL. Many of the security vulnerabilities in IEEE 802.11 are due to unauthenticated / unencrypted management and control f...
متن کاملImprovement of Fairness by PCRQ scheduling in Multihop Wireless Ad hoc Networks
The IEEE 802.11 MAC protocol for medium access control in wireless Local Area Networks (LANs) is the de facto standard for wireless ad hoc networks, however, it does not perform well in terms of delay, throughput, and specially, fairness in multihop wireless ad hoc networks. Many researches have been published in this area. Among them, a modification of the IEEE 802.11 MAC protocol was proposed...
متن کاملSmartNode: Achieving 802.11 MAC Interoperability in Power-efficient Ad Hoc Networks with Dynamic Range Adjustments
The standard CSMA/CA based IEEE 802.11 protocol assumes that each node uses a certain fixed (or maximum) transmission power for the transmission of each packet. However, a MAC protocol with power adjustments can have significant benefits towards better power conservation and higher system throughput through better spatial reuse of spectrum. In this work, we propose a power efficient MAC layer a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Wireless Communications and Mobile Computing
دوره 9 شماره
صفحات -
تاریخ انتشار 2009