Online citations, reference lists, and bibliographies.
← Back to Search

Performance Study Of 802.11w For Preventing DoS Attacks On Wireless Local Area Networks

Chibiao Liu, Jinming Qiu
Published 2017 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy Visualize in Litmaps
Reduce the time it takes to create your bibliography by a factor of 10 by using the world’s favourite reference manager
Time to take this seriously.
Get Citationsy
Faked deauthentication and disassociation frames introduce serious denial of service (DoS) attacks on wireless local area networks (WLANs), and these attacks include deauthentication flooding (DeauthF) and disassociation flooding (DisassF). IEEE 802.11w standard was introduced to extend 802.11i functionalities for preventing DeauthF and DisassF, and so far there has been no detailed theoretical and experimental study on the performance of 802.11w for resolving these attacks. We implemented a prototype at the lab to perform detailed study on the performance of 802.11w for preventing rogue AP based DoS attacks, and the study shows that the current IEEE 802.11w standard cannot resolve DeauthF and DisassF at high attacking rates. Then, based on 802.11 wireless station (STA) modules, a STA-based queuing model is developed to derive a mathematical model for explaining 802.11w performance variations under DeauthF and DisassF attacks. Furthermore, using frame sequence checking and frame queuing, we propose a traffic shaping (TS) scheme to enhance the current IEEE 802.11w standard, and experimental results show that the proposed approach of 802.11w-TS is effective in preventing low-rate and high-rate DeauthF and DisassF attacks under various attacking scenarios.
This paper references
Schaum's outline of theory and problems of elementary algebra
Barnett Rich (1993)
Capacity Planning for Web Performance: Metrics, Models, and Methods
D. Menascé (1998)
SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11
H. Johnson (2002)
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11
Haoli Wang (2003)
Joint Burke's Theorem and RSK Representation for a Queue and a Store
M. Draief (2003)
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
J. Bellardo (2003)
Improving the security of wireless LANs by managing 802.1x disassociation
P.Q. Ding (2004)
Performance by Design - Computer Capacity Planning By Example
D. Menascé (2004)
Study of the TCP upstream/downstream unfairness issue with per-flow queuing over infrastructure-mode WLANs: Research Articles
Y. Wu (2005)
Study of the TCP upstream/downstream unfairness issue with per-flow queuing over infrastructure-mode WLANs
Yi Wu (2005)
Zero-automatic networks
Thu-Ha Dao-Thi (2006)
802.11 De-authentication Attack Detection Using Genetic Programming
P. LaRoche (2006)
Pseudo Randomized Sequence Number Based Solution to 802.11 Disassociation Denial of Service Attack
Baber Aslam (2006)
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks
Thuc D. Nguyen (2008)
Reputation Based Access Point Selection in 802.11 Network
Q. Ding (2008)
Pseudo Random Number Based authentication to counter denial of service attacks on 802.11
M.A. Khan (2008)
Fragility of the Robust Security Network: 802.11 Denial of Service
Martin Eian (2009)
An ANFIS-IDS against deauthentication DOS attacks for a WLAN
J. Mar (2010)
Weakness in 802.11w and an improved mechanism on protection of management frame
Weijia Wang (2011)
Short paper: security evaluation of IEEE 802.11w specification
Md. Sohail Ahmad (2011)
A formal analysis of IEEE 802.11w deadlock vulnerabilities
Martin Eian (2012)
Formal Verification of IEEE 802.11 Authentication Protocols
K. Raju (2013)
Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance
J. Milliken (2013)
Detection of De-authentication Denial of Service attack in 802.11 networks
M. Agarwal (2013)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar