Home // ICDS 2018, The Twelfth International Conference on Digital Society and eGovernments // View article
Denial of Service Attack in Wireless LAN
Authors:
Tauseef Jamal
Pedro Amaral
Asifullah Khan
Aneela Zameer
Kiramat Ullah
Shariq Aziz Butt
Keywords: Virtual Carrier Sense; Medium Access Control; CTS Attack; DoS Attack.
Abstract:
IEEE 802.11 specifications set the standard for Physical and Medium Access Control (MAC) layer for implementing wireless Local Area Network (LAN). In the wireless network, nodes share media elements with each other. Nodes in wireless network access the media through physical layer using Clear Channel Assessment (CCA) plus Virtual Carrier Sense (VCS) at MAC layer. If VCS timer is not properly handled, there is the possibility of Denial of Service (DoS) attack. In this article, we discuss two scenarios. In the first scenario, DoS attack is launched by increasing the time duration of Clear To Send (CTS) frame. When the CTS frame is received by other nodes, they update their Network Allocation Vector (NAV) for extra time. In prevention step, nodes first detect the malicious duration in the CTS frame and then correct the NAV timer to mitigate the attack. This technique is known as RCD (Re-Evaluation of CTS Duration). In the second scenario, DoS attack is launched by flooding the CTS frame periodically. All other overhearing nodes update their NAV and remain in wait state. To handle such kind of attack, nodes never directly update their NAV after receiving CTS, but after checking the Transmitter Address (TA) and Receiver Address (RA). To increase back the performance of network, blacklisting of malicious node technique is used in both scenarios when a DoS attack is detected.
Pages: 42 to 47
Copyright: Copyright (c) IARIA, 2018
Publication date: March 25, 2018
Published in: conference
ISSN: 2308-3956
ISBN: 978-1-61208-615-6
Location: Rome, Italy
Dates: from March 25, 2018 to March 29, 2018