Abstract

The major cause of threat circling around the wireless local area infrastructure network is Denial of Service (DoS) attack. The anticipated users will be denied from availing the resources by spoofing the Medium Access Control (MAC) address of the legitimate client/AP. Less protection in MAC address led to get easy spoofing. Since, the management frame has been unencrypted; adversary sends the management frame to the victim using the spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for a DoS attack. Many security mechanisms are obtainable which have their own drawback in providing complete prevention of DoS attack. This paper proposes ThreV mechanism which detects and prevents the intruder in an efficient manner. The solutions are simulated using NS2, to analyze how far it prevents the DoS attacks. The simulation result of the proposed algorithm measures the packet delivery ratio, control overhead, normalized routing overhead, throughput, delay and packet loss. The experimental result proved the effectiveness of proposed ThreV algorithm in detecting and preventing MAC spoof DoS attacks.

Highlights

  • Security issues in wireless network increases as popularity increases

  • This paper proposes a Threshold Value (ThreV) algorithm to address the issues of preventing attacks in an infrastructure network

  • If the Medium Access Control (MAC) address is not present in the table, Computerized Monitoring System (CMS) blocks the user from further communication, whereas if the user‘s identity was found in Basic Identity Check (BIC), the ThreV mechanism takes over the request

Read more

Summary

Introduction

Security issues in wireless network increases as popularity increases. Wireless Local Area Networks (WLAN) are popular due to easy installation and it offers increased wireless access to the client with the help of Access Point (AP). Wireless Local Area Network (WLAN) architecture is divided into three types; these are Infrastructure architecture, ad-hoc architecture and mixed mode architecture. Physical protection of wired medium such as firewalls and shields cannot be applied to wireless networks. ThreV - An Efficacious Algorithm to Thwart MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network the protection of the wireless network. The 802.1x is a security protocol based on the frame structure of 802.11 It attempts to provide strong authentication, access control and WEP key management for Wireless LANs. 802.1x misses its goals in access control DoS attacks[2]. This paper proposes a ThreV algorithm to address the issues of preventing attacks in an infrastructure network.

Related Work
Attacks in WLAN
Denial of Service
EAPOL start frame
EAPOL logoff frame
Proposed Solution to Prevent DoS Attack
ThreV in EAP Start Frame Attack
ThreV in EAPOL Logoff Frame Attack
Experimental Evaluation of ThreV Algorithm
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.