Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 3
Year of Publication: 2013
Authors:
Paridhi Singhal
Manoj Diwakar
Mandeep Katre
10.5120/9911-4507

Paridhi Singhal, Manoj Diwakar and Mandeep Katre. Article: Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake. International Journal of Computer Applications 61(3):31-35, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Paridhi Singhal and Manoj Diwakar and Mandeep Katre},
	title = {Article: Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {3},
	pages = {31-35},
	month = {January},
	note = {Full text available}
}

Abstract

In today's world most organizations are moving from wire-connected LAN to wireless LAN. The phenomenal popularity of the 802. 11 network standards stems from the fact that they provide for wireless connections with ease and convenience. Recently, security holes have been identified in the operation of 802. 11 networks, and the 802. 11i protocol has been announced to protect such networks. However, there are still security issues that prevent the 802. 11 network from becoming the best choice protocol for wireless LANs. We reviewed 802. 11i security with a focus on a denial of service attack. This attack exhausts the client's memory using a vulnerability of the key derivation procedure in 802. 11i. It is vulnerable to various Denial of Service attacks (DoS) which includes de-authentication and disassociation attacks including memory exhaustion attacks. For Dos and memory exhaustion attacks which are possible in 4-way handshake ,this paper provides an enhanced 3-way Handshake algorithm which is free from these attacks in comparison to original protocol and is more secure.

References

  • IEEE Standard 802. 11-1999. Information technology – Telecommunications and information exchange between Systems – Local and metropolitan area networks – Specific Requirements – Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications. 1999. IEEE Standard 802. 11b-1999. Higher-Speed Physical Layer Extension in the 2. 4 GHz Band, Supplement to IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. September, 1999.
  • Guide to Internet Security
  • What's New in Security: WPA (Wi-Fi Protected Access).
  • Seung-Jo HanHeang-Soo Oh JonganPark Dept. of Electron. Eng. , Chosun Univ. " The improved data encryption standard (DES) algorithm. , Spread Spectrum Techniques and Applications Proceedings, 1996.
  • A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802. 1X standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, Md, USA, February 2002
  • Xiaodong Zha ; Maode Ma ," Security improvements of IEEE 802. 11i 4-way handshake scheme",IEEE International Conference on Communication Systems(ICCS) 2010.
  • Xinyu Xing; Shakshuki, E. ; Benoit, D. ; Sheltami, T. ; "Security Analysis and Authentication Improvementfor IEE802. 11i Specification",Global Telecommunications Conference, 2008.
  • http://wwwvs. informatik. uniulm. de/de/intra/bib/2008/ICC/DATA/S04S07P05. PDF
  • http://www. massey. ac. nz/~dpparson/004. pdf
  • C. He and J. C. Mitchell, "Analysis of the 802. 11i 4-Way Handshake," in Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 43 - 50.
  • V. Moen, H. Raddum, and K. J. Hole, "Weaknesses in the temporal key hash of WPA," ACMSIGMOBILEMobile Computing and Communications Review, vol. 8, no. 2, pp. 76–83, 2004
  • F. D. Rango, D. C. Lentini, and S. Marano, "Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected
  • D. B. Faria and D. R. Cheriton, "DoS and authentication in wireless public access networks," in Proceedings of the ACM Workshop on Wireless Security (WiSe '02), pp. 47–56, Atlanta, Ga, USA, September 2002.