Abstract
Unlike wired networks, wireless networks do not have well-defined physical boundaries, which makes them prone to several security threats. As various wireless networks evolve into the next generation to provide better services, a key technology in the form of wireless mesh networks (WMNs) has emerged recently. Wireless Mesh Networks hold the promise of facilitating large-scale community networks in complex environments. There are number of issues in deploying WMNs, amongst others, security is a very serious issue. In these and other vital or security-sensitive deployments, keeping the network available for its intended use is essential. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold. One of the major loop-holes in the security of WMNs is that management frames are not authenticated, and hence can be easily spoofed to cause DoS or Denial of Service attacks. We analyze the existing schemes and the proposed protocols to authenticate Disassociation and Deauthentication management frames. In this paper an original scheme is proposed that can be used to prevent DoS attacks over 802.11i security standard.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE 802.11 Architecture, http://www.tutorial-reports.com/wireless/wlanwifi/wifi_architecture.php
Fogie, S.: Maximum Wireless Security by Cyrus PeiKari. Sams Publishing, ISBN:0-672-32488-1
Wang, Y.: A Tutorial of 802.11 Implementation in NS-2
Zhang, H., Zhu, Y.: A New Authentication and Key Managemtn Scheme of WLAN
Ergen, M.: University of California Berkley, IEEE 802.11 Tutorial (June 2002)
Gast, M.: 802.11 Wireless Networks. O’Reilly & Associates, Inc., Sebastopol (2002)
Miller, S.S.: Wi-Fi Security. Tata McGraw Hill Publication, New York
Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff Canada (2006)
Liu, C., Yu, J.T.: A Solution to Wireless LAN Authentication and Association DoS Attacks. In: Second International Conference on Computer Science and Engineering (JICCSE 2006) (December 2006)
A Protocol to defend Against Deauthentication and Disassociation Attacks, A Dissertation submitted to PEC (Deemed University) for Masters of Engineering in Computer Science and Engineering (2008)
Liu, C., Yu, J.: Rogue Access Point Based DoS Attacks against 802.11 WLANs. In: Fourth Advanced International Conference on Telecommunications
Qi, E.H., Walker, J.: Management frame protection. Intel Corporation (2005)
Lee, Y.-S., Chien, H.-T., Tsai, W.-N.: Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks
Zhang, H., Zhu, Y.: A New Authentication and Key Management Scheme of WLAN
Malekzadeh, M., Ghani, A.A.A., Zulkarnain, Z.A., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 7(6) (June 2007)
Ferreri, F., Bernaschi, M., Valcamonici, L.: Access points vulnerabilities to DoS attacks in 802.11 networks. In: WCNC 2004. IEEE Communications Society, Los Alamitos (2004)
Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks. Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C, August 4-8 (2003)
Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociation. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, January 2004, pp. 53–58 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Divya, Kumar, S. (2010). Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-11530-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11529-5
Online ISBN: 978-3-642-11530-1
eBook Packages: Computer ScienceComputer Science (R0)