Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network

被引:1
|
作者
Durairaj, M. [1 ]
Persia, A. [1 ]
机构
[1] Bharathidasan Univ, Sch Comp Sci Engn & Applicat, Tiruchirappalli, Tamil Nadu, India
来源
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1 | 2015年 / 324卷
关键词
Denial of service; Medium access control; Spoofed MAC address; Threshold value algorithm; Wired equivalent protocol;
D O I
10.1007/978-81-322-2126-5_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A major threat in wireless local area infrastructure network is denial-of-service (DoS) attacks. It makes the resources unavailable for its anticipated user which can be accomplished through spoofing legitimate client/AP's medium access control (MAC) address. Less protection in MAC address led to get easy spoofing. Since the management frame is unencrypted, adversary sends the management frame to the victim using spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for DoS attack. Even though several preventing mechanisms are available, no one provides complete solution in preventing MAC layer DoS attack. This paper proposes a theoretical framework of threshold value (ThreV) algorithm, which is based on setting up ThreV for the management frame, to effectively address this issue.
引用
收藏
页码:99 / 107
页数:9
相关论文
共 32 条
  • [1] A New Local Area Network Attack through IP and MAC Address Spoofing
    Shaw, Shashi
    Choudhury, Prasenjit
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 347 - 350
  • [2] Wireless Local Area Network Behavior under RTS Flood DoS Attack
    Stojanoski, Peco
    Bogdanoski, Mitko
    Risteski, Aleksandar
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 83 - 86
  • [3] Transient MAC address scheme for untraceability and DoS attack resiliency on wireless network
    Inone, D
    Nomura, R
    Kuroda, M
    2005 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2005, : 15 - 23
  • [4] A MAC Protocol with Slot Prediction Algorithm for Wireless Body Area Network
    Miyazaki, Toshikuni
    Fukuya, Tomohiro
    Kohno, Ryuji
    2017 11TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2017, : 11 - 14
  • [5] Fast Collision Resolution (FCR) MAC algorithm for wireless local area networks
    Kwon, Y
    Fang, YG
    Latchman, H
    GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 2250 - 2254
  • [6] MULTI-PRIORITY MAC PROTOCOL FOR TERAHERTZ WIRELESS LOCAL AREA NETWORK
    Ding, Yuanming
    Liu, Yang
    Feng, Jianxin
    2022 34TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2022, : 3427 - 3432
  • [7] Spoofing Attack Detection Approaches based on Indoor Channel Continuity in IEEE 802.11 Wireless Local Area Networks
    He, Ziming
    Tong, Fei
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [8] An optimum combiner for a smart antenna in an indoor infrastructure wireless local area network
    Nasr, KM
    Costen, F
    Barton, SK
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 193 - 197
  • [9] A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies
    Ryoo, Jungwoo
    Choi, Young B.
    Oh, Tae Hwan
    Corbin, Gregory
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2009, 7 (02) : 253 - 267
  • [10] Modeling and Simulation of Wireless Local Area Network MAC Access Mechanism in Oil Field
    Wang, Xiu-Fang
    Du, Hong
    Wei, Yu-heng
    Fu, Li-li
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2148 - 2151