Authentication/Association Flooding Dos Attacks And Their Impact On Wireless Mesh Networks(ICWN 11)
نویسندگان
چکیده
Wireless mesh network is the key technology for present generation in wireless networking for providing fast and hassle free services to users. The conformity of Wireless Mesh Networks to offer Internet connectivity is becoming a popular choice for Wireless Internet Service Providers, as it allows a flexible, easy and inexpensive network deployment. However, these networks are prone to critical attacks because of the security fissures in the draft standard. Moreover security in Wireless Mesh Networks is still in its infancy as very little attention has been devoted so far to this topic by the research community. The security mechanisms proposed so far can work well for securing only data frames.Management frames are unencrypted and have been sent transparently, thus facilitating the launch of dos attacks. So for pervasive network connectivity, it is mandatory to thwart these attacks for the uninterrupted and stable network availabilty. In this paper we have analyzed the impact of Authentication and Association flooding dos attacks over the network performance.
منابع مشابه
A Solution to WLAN Authentication and Association DoS Attacks
-The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security standard, 802.11i, addresses most issues on user authentication and data encryption; however, it does not protect WLANs against Denial of Service (DoS) attacks. This paper presents a solution to detect and resolve authentication request flooding (AuthRF) and associa...
متن کاملAttackers, Packets, and Puzzles: On Denial-of-Service Prevention in Local Area Networks
In this thesis, we tackle the problem of securing communication in Local Area Networks (LANs) and making it resistant against Denial-of-Service (DoS) attacks. The main vulnerability in wired and wireless LANs is the lack of initial address authenticity. It enables an attacker to take on different identities and to inject faked packets bearing a foreign or a bogus sender address. For this reason...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
Wireless mesh networks (WMNs) are considered as cost effective, easily deployable and capable of extending Internet connectivity. However, one of the major challenges in deploying reliable WMNs is preventing their nodes from malicious attacks, which is of particular concern as attacks can severely degrade network performance. When a DoS attack is targeted over an entire communication path, it i...
متن کاملAnalysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
Unlike wired networks, wireless networks do not have well-defined physical boundaries, which makes them prone to several security threats. As various wireless networks evolve into the next generation to provide better services, a key technology in the form of wireless mesh networks (WMNs) has emerged recently. Wireless Mesh Networks hold the promise of facilitating large-scale community network...
متن کامل