802.11 Disassociation DoS attack Simulation Using Verilog*
نویسندگان
چکیده
A number of Denial of Service (DoS) attacks in IEEE 802.11 are due to unauthenticated/ unencrypted management and control frames. Current IEEE 802.11 simulators deal with Physical and MAC layers and do not include the exchange of management and control frames, thus making it difficult to simulate an attack (DoS) and its possible solution. A basic IEEE 802.11 network simulator using Verilog is presented. Basic aim is to design a simulator using a hardware description language (HDL) such as Verilog, since the functions and protocols described in state machines are best simulated using a HDL. Besides simulation of a simple wireless network, the paper also presents simulation of a spoofed MAC disassociation DoS attack and one of its possible solutions. The proposed simulator includes the communication setup process and can be used for simulating other DoS attacks and their possible solutions. Key-Words: Network Simulator, IEEE 802.11, Verilog, Wireless LAN, Link layer simulation.
منابع مشابه
Fragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two other DoS vulnerabilities: one vulnerability in draft 802.11w implementations discovered by IEEE 802.11 TGw, and one new vulnerability in 802.11, which is still present in the 802.11w amendment. Attacks exploiting the fi...
متن کاملIEEE 802.11 Wireless Network Simulator Using Verilog
This paper presents a basic IEEE 802.11 network simulator using Verilog. Basic aim of this paper was to design a simulator using a hardware description language (HDL) such as Verilig, since the functions and protocols described in a state machines are best simulated using a HDL. Many of the security vulnerabilities in IEEE 802.11 are due to unauthenticated / unencrypted management and control f...
متن کاملA Simulation Study of Collusion and Network Partition Denial of Service Attack in IEEE 802.11 and FAIRMAC Protocol
In this paper, we simulated Collusion and Network partition DoS attacks using GlomoSIm (GLobal MObile information system SIMulator). The network with 36 nodes in grid pattern was chosen. Throughput analysis with and without DoS attack was carried out for varying number of nodes. The importance of fairness in MAC layer is also justified through the results obtained. Keywords— DoS, Collusion, Par...
متن کاملMEDIUM ACCESS CONTROL SPOOF DETECTION AND PREVENTION ALGORITHM (MAC SDP DoS) FOR SPOOFING ATTACKS IN WLAN
Wireless Local Area Network (WLAN) is widely used today because of its mobility and ease of deployment. Providing complete security to the WLAN users is a challenge due to the open nature and undefined boundaries of the wireless networks. This paper is intended to protect the 802.11 WLAN environments from Medium Access Control (MAC) layer Denial of Service (DoS) attacks especially, the deauthen...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کامل