Skip to main content

Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks

  • Conference paper
Information Security and Digital Forensics (ISDF 2009)

Abstract

Unlike wired networks, wireless networks do not have well-defined physical boundaries, which makes them prone to several security threats. As various wireless networks evolve into the next generation to provide better services, a key technology in the form of wireless mesh networks (WMNs) has emerged recently. Wireless Mesh Networks hold the promise of facilitating large-scale community networks in complex environments. There are number of issues in deploying WMNs, amongst others, security is a very serious issue. In these and other vital or security-sensitive deployments, keeping the network available for its intended use is essential. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold. One of the major loop-holes in the security of WMNs is that management frames are not authenticated, and hence can be easily spoofed to cause DoS or Denial of Service attacks. We analyze the existing schemes and the proposed protocols to authenticate Disassociation and Deauthentication management frames. In this paper an original scheme is proposed that can be used to prevent DoS attacks over 802.11i security standard.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 802.11 Architecture, http://www.tutorial-reports.com/wireless/wlanwifi/wifi_architecture.php

  2. Fogie, S.: Maximum Wireless Security by Cyrus PeiKari. Sams Publishing, ISBN:0-672-32488-1

    Google Scholar 

  3. Wang, Y.: A Tutorial of 802.11 Implementation in NS-2

    Google Scholar 

  4. Zhang, H., Zhu, Y.: A New Authentication and Key Managemtn Scheme of WLAN

    Google Scholar 

  5. Ergen, M.: University of California Berkley, IEEE 802.11 Tutorial (June 2002)

    Google Scholar 

  6. Gast, M.: 802.11 Wireless Networks. O’Reilly & Associates, Inc., Sebastopol (2002)

    Google Scholar 

  7. Miller, S.S.: Wi-Fi Security. Tata McGraw Hill Publication, New York

    Google Scholar 

  8. Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff Canada (2006)

    Google Scholar 

  9. Liu, C., Yu, J.T.: A Solution to Wireless LAN Authentication and Association DoS Attacks. In: Second International Conference on Computer Science and Engineering (JICCSE 2006) (December 2006)

    Google Scholar 

  10. A Protocol to defend Against Deauthentication and Disassociation Attacks, A Dissertation submitted to PEC (Deemed University) for Masters of Engineering in Computer Science and Engineering (2008)

    Google Scholar 

  11. Liu, C., Yu, J.: Rogue Access Point Based DoS Attacks against 802.11 WLANs. In: Fourth Advanced International Conference on Telecommunications

    Google Scholar 

  12. Qi, E.H., Walker, J.: Management frame protection. Intel Corporation (2005)

    Google Scholar 

  13. Lee, Y.-S., Chien, H.-T., Tsai, W.-N.: Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks

    Google Scholar 

  14. Zhang, H., Zhu, Y.: A New Authentication and Key Management Scheme of WLAN

    Google Scholar 

  15. Malekzadeh, M., Ghani, A.A.A., Zulkarnain, Z.A., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 7(6) (June 2007)

    Google Scholar 

  16. Ferreri, F., Bernaschi, M., Valcamonici, L.: Access points vulnerabilities to DoS attacks in 802.11 networks. In: WCNC 2004. IEEE Communications Society, Los Alamitos (2004)

    Google Scholar 

  17. Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks. Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C, August 4-8 (2003)

    Google Scholar 

  18. Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociation. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, January 2004, pp. 53–58 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Divya, Kumar, S. (2010). Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11530-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11529-5

  • Online ISBN: 978-3-642-11530-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics