A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sofat, Sanjeev
- Beacon Spoofing Attack:Impact and Security in Wireless Mesh Networks
Authors
1 PEC University of Technology, Chandigarh, IN
2 Computer Science Department , PEC University of Technology, Chandigarh, IN
Source
Wireless Communication, Vol 3, No 9 (2011), Pagination: 648-654Abstract
Wireless Mesh Networks have become an inevitable choice for gaining network access as it offers ubiquitous connectivity and improved performance due to the flexibility, scalability, features that it provides. Along with all these functionalities come the threats and vulnerabilities especially due to the fact that in case of wireless mesh networks the mesh points and mesh access points are deployed at different locations and are connected through a wireless medium to the portal. This radio communication between the mesh entities may even be heard by the attacker. The attacker may spoofs and masquerades the unencrypted management frames, thus facilitating the launch of Denial of service attacks. Moreover different mesh points communicate with each other via the forwarding action that too is based on radio communication. So the mesh devices are also vulnerable to physical tamper besides all other kinds of attacks. There is imperative need for the techniques that may thwart all kinds of security attacks. In this paper we have analyzed the impact of the beacon spoofing attack and flooding attack over the Wireless Mesh Networks test bed and proposed a security algorithm to detect this attack.Keywords
Beacon Spoofing, Denial of Service, Detection Algorithm, Flooding Attack, Spoofing, Wireless Mesh Networks.- Prevention of DoS Attacks in 802.11s Wireless Mesh Networks
Authors
1 Computer Science & Engineering, Punjab Engineering College, Chandigarh, IN
Source
Wireless Communication, Vol 1, No 3 (2009), Pagination: 157-163Abstract
Unlike wired networks, wireless networks do not have well-defined physical boundaries, which makes them prone to several security threats. As various wireless networks evolve into the next generation to provide better services, a key technology in the form of wireless mesh networks (WMNs) has emerged recently. Wireless Mesh Networks hold the promise of facilitating large-scale community networks in complex environments. There are number of issues in deploying WMNs, amongst others, security is a very serious issue. In these and other vital or security-sensitive deployments, keeping the network available for its intended use is essential. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold. One of the major loop-holes in the security of WMNs is that management frames are not authenticated, and hence can be easily spoofed to cause DoS or Denial of Service attacks. We analyze the existing schemes and the proposed 802.11w draft to authenticate Disassociation and Deauthentication management frames. In this paper an amendment to the draft of 802.11w is proposed that can be used to prevent DoS attacks over 802.11i security standard. Further specific DoS attacks that that cannot be solved by the proposed draft are also analyzed in this paper.