Abstract
The major cause of threat circling around the wireless local area infrastructure network is Denial of Service (DoS) attack. The anticipated users will be denied from availing the resources by spoofing the Medium Access Control (MAC) address of the legitimate client/AP. Less protection in MAC address led to get easy spoofing. Since, the management frame has been unencrypted; adversary sends the management frame to the victim using the spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for a DoS attack. Many security mechanisms are obtainable which have their own drawback in providing complete prevention of DoS attack. This paper proposes ThreV mechanism which detects and prevents the intruder in an efficient manner. The solutions are simulated using NS2, to analyze how far it prevents the DoS attacks. The simulation result of the proposed algorithm measures the packet delivery ratio, control overhead, normalized routing overhead, throughput, delay and packet loss. The experimental result proved the effectiveness of proposed ThreV algorithm in detecting and preventing MAC spoof DoS attacks.
Highlights
Security issues in wireless network increases as popularity increases
This paper proposes a Threshold Value (ThreV) algorithm to address the issues of preventing attacks in an infrastructure network
If the Medium Access Control (MAC) address is not present in the table, Computerized Monitoring System (CMS) blocks the user from further communication, whereas if the user‘s identity was found in Basic Identity Check (BIC), the ThreV mechanism takes over the request
Summary
Security issues in wireless network increases as popularity increases. Wireless Local Area Networks (WLAN) are popular due to easy installation and it offers increased wireless access to the client with the help of Access Point (AP). Wireless Local Area Network (WLAN) architecture is divided into three types; these are Infrastructure architecture, ad-hoc architecture and mixed mode architecture. Physical protection of wired medium such as firewalls and shields cannot be applied to wireless networks. ThreV - An Efficacious Algorithm to Thwart MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network the protection of the wireless network. The 802.1x is a security protocol based on the frame structure of 802.11 It attempts to provide strong authentication, access control and WEP key management for Wireless LANs. 802.1x misses its goals in access control DoS attacks[2]. This paper proposes a ThreV algorithm to address the issues of preventing attacks in an infrastructure network.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.