Denial of Service Attack in Wireless LAN

Tauseef Jamal, Pedro Miguel Figueiredo Amaral, Asifullah Khan, Aneela Zameer , Kiramat Ullah , Shariq Butt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

IEEE 802.11 specifications set the standard for Physical and Medium Access Control (MAC) layer for implementing wireless Local Area Network (LAN). In the wireless network, nodes share media elements with each other. Nodes in wireless network access the media through physical layer using Clear Channel Assessment (CCA) plus Virtual Carrier Sense (VCS) at MAC layer. If VCS timer is not properly handled, there is the possibility of Denial of Service (DoS) attack. In this article, we discuss two scenarios. In the first scenario, DoS attack is launched by increasing the time duration of Clear To Send (CTS) frame. When the CTS frame is received by other nodes, they update their Network Allocation Vector (NAV) for extra time. In prevention step, nodes first detect the malicious duration in the CTS frame and then correct the NAV timer to mitigate the attack. This technique is known as RCD (Re-Evaluation of CTS Duration). In the second scenario, DoS attack is launched by flooding the CTS frame periodically. All other overhearing nodes update their NAV and remain in wait state. To handle such kind of attack, nodes never directly update their NAV after receiving CTS, but after checking the Transmitter Address (TA) and Receiver Address (RA). To increase back the performance of network, blacklisting of malicious node technique is used in both scenarios when a DoS attack is detected.
Original languageEnglish
Title of host publication12th International Conference on Digital Society and eGovernments (ICDS 2018), Proceedings
PublisherIARIA
Pages42-47
ISBN (Electronic)978-1-61208-615-6
Publication statusPublished - 2018
Event12th International Conference on Digital Society and eGovernments (ICDS 2018) - Rome, Italy
Duration: 25 Mar 201829 Mar 2018

Conference

Conference12th International Conference on Digital Society and eGovernments (ICDS 2018)
CountryItaly
CityRome
Period25/03/1829/03/18

Fingerprint Dive into the research topics of 'Denial of Service Attack in Wireless LAN'. Together they form a unique fingerprint.

Cite this