CFP last date
20 May 2024
Reseach Article

Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks

by Rupinder Cheema, Divya Bansal, Dr. Sanjeev Sofat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 23 - Number 7
Year of Publication: 2011
Authors: Rupinder Cheema, Divya Bansal, Dr. Sanjeev Sofat
10.5120/2901-3801

Rupinder Cheema, Divya Bansal, Dr. Sanjeev Sofat . Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks. International Journal of Computer Applications. 23, 7 ( June 2011), 7-15. DOI=10.5120/2901-3801

@article{ 10.5120/2901-3801,
author = { Rupinder Cheema, Divya Bansal, Dr. Sanjeev Sofat },
title = { Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 23 },
number = { 7 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 7-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume23/number7/2901-3801/ },
doi = { 10.5120/2901-3801 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:09:31.215710+05:30
%A Rupinder Cheema
%A Divya Bansal
%A Dr. Sanjeev Sofat
%T Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 23
%N 7
%P 7-15
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Mesh Networks have emerged as a widely deployed, new paradigm with improved performance and reliability. Mesh Networks offer ubiquitous network connectivity along with better flexibility and adaptability features. Despite of these benefits, Wireless Mesh Networks are vulnerable to attacks due to the absence of trusted central authority and the unprotected nature of the management frames. This security breach leads to the spoofing of legitimate client’s information. Thus facilitating the launch of dos attacks on the behalf of the legitimate identity holders .The influence of DOS attacks is highly intense, because complete network resources have been consumed by the attacker after launch of the attack. Consequently, it leads to deterioration of network performance thus halting the communication. Therefore, security is a major concern that needs to be dealt with to alleviate the effect of these attacks . So that the deterioration and disruption caused by these attacks to the network performance has been thwarted. In this paper we have implemented the dos attacks on the real wireless mesh test bed and analyzed their impact on the network performance and proposed a security algorithm for the detection of these attacks.

References
  1. Stuart Compton, Charles Hornat. May 17th 2007 802.11 Denial Of Service Attacks and Mitigation. SANS Institute InfoSec Reading Room.
  2. John Bellardo and Stefan Savage. Aug 4 -8, 2003 Denial of Service Attacks: Real Vulnerabilities and Practical Solutions. In the Proceedings of the 12TH USENIX Security Symposium. Washington, D.C., U.S.A.
  3. N. Bisnik and A. Abouzeid Jun 2006 Delay and Throughput in Random Access Wireless Mesh Networks. In the Proceedings Of IEEE International Conference on Communications (ICC 2006). vol.1, pp. 403 -408.
  4. Joshua Wright Jan 21, 2003 Detecting wireless LAN MAC Address spoofing. GCIH, CCNA, pp 1-5.
  5. Asier Martinez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernandez, Jesus lizarraga, Ainhoa Serna and Inaki Velez 4-7th March 2008 Beacon frame Spoofing Attack Detection in IEEE 802.11 Networks. In the proceedings of the third international conference on Availability, Reliability and Security (ARES08). pp 520-522, Barcelona.
  6. Thuc D. Nguyen, Duc H. M. Nguyen. Aug 3 -7, 2008 A light weight solution for defending against deauthentication / disassociation attacks on 802.11 networks. In the proceedings of 17th International Conference on Computer Communications and Networks. St. Thomas, U.S. Virgin Islands , USA.
  7. Baber Aslam, M Hasan Islam and Shoab A.Khan Sep 17-20, 2006 802.11 Disassociation Dos Attack and its Solutions: A Survey. In the proceedings of the First International Conference on Mobile Computing and Wireless Communication. pp 221-222, Amman.
  8. Fanglu Guo and Tzi-cker Chiueh. Sequence Number Based MAC Address Spoof Detection. In the book named Lecture Notes In Computer Science. pp 315-325, Volume 3858/2006, Springer Link.
  9. AirJack. http://sourceforge.net/projects/airjack/
  10. Airsnarf. http://airsnarf.shampoo.com/
  11. KisMAC//binaervarianz.de/projekte/programmieren/kismac
  12. D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti June 22-27, 2003 Multilevel Monitoring and Detection Systems (MMDS). In the proceedings of the 15th Annual Computer Security Incident Handling Conference (FIRST). Ottawa, Canada.
  13. E. D Cardenas. MAC Spoofing {An Introduction. http://www.giac.org/practical/GSEC/Edgar Cardenas GSEC.pdf.
  14. J. Hall, M. Barbeau and E. Kranakis November 22-24, 2004. Using Transceiver Prints for Anomaly Based Intrusion Detection. In Proceedings of 3rd IASTED, CIIT 2004. St. Thomas, US Virgin Islands, USA.
  15. F. Robinson 2004 802.11i and WPA up Close. Network Computing.
  16. Peter Egli, Product Manager Wireless & Networking Technologies,” Susceptibility of wireless devices to denial of service attacks”/http://www.netmodule.com.
  17. A. Gerkis and J. Purcell. Sep 2006 A Survey of Wireless Mesh Networking Security Technology and Threats. Sans Infosec Reading Room.
  18. Wireless Mesh Networks /http://www.wikkipedia
  19. White papers “Can Wireless LAN Denial of Service Attacks Be Prevented? “Understanding WLAN Vulnerabilities and their Countermeasures.
  20. TJ O Connor. Oct 13 , 2010. Detecting and Responding to Data Link Layer Attack. Sans Institute Infosec Reading Room.
  21. Jon Edney, William A. Arbaugh. 2003. Real 802.11 Security: Wi-Fi Protected Access and 802.11i, 480 pages, Addison Wesley, ISBN: 0-321-13620-9.
  22. Matthew S. Gast. April 2002. 802.11 Wireless Networks: The Definitive Guide, 464 pages, O’Reilly & Associates, ISBN: 0596001835.
  23. Vikram Gupta, Srikanth Krishnamurthy, Michalis Faloutsos. October 2002. “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks”, Proceedings of 2002 MILCOM Conference, Anaheim, CA.
  24. S. Asherson, A. Hutchison. “Secure Routing in Wireless Mesh Networks”. University of Cape Town.
  25. S. Kapp. Jan./Feb. 2002. 802.11: Leaving the Wire Behind. IEEE Internet Computing, vol. 6, no. 1, , pp. 82-85.
  26. CERT/CC. 2001. Denial of Service Attacks. Available Online: http://www.cert.org/tech tips/denial of service.html.
Index Terms

Computer Science
Information Sciences

Keywords

Management frames MAC address Threshold value Detection of dos attacks