Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network

M. Durairaj and A. Persia
School of Computer Science, Engineering and Applications, Bharathidasan University, Tiruchirappalli-23, Tamilnadu, India
Research Journal of Applied Sciences, Engineering and Technology  2014  19:4162-4170
http://dx.doi.org/10.19026/rjaset.7.782  |  © The Author(s) 2014
Received: December 28, 2013  |  Accepted: January 10, 2014  |  Published: May 15, 2014

Abstract

A Comparison of Integrated Central Manager (ICM) and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP) is done. Denial of Service (DoS) attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for intended users which transpired through spoofing legitimate Client/AP's Medium Access Control (MAC) address. MAC address are easily caricatured by the adversary clients, subsequently they are not encrypted. Since, the adversary sends the management frame, which is unencrypted, to the victim using spoofed MAC address. This study compares the performance of Integrated Central Manager (ICM) and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP) and evaluated the result using NS2. The attack scenario is simulated and effectiveness of the solutions is validated after the instigation of solutions in the attack consequences. Throughput, Packet Delivery Ratio and Packet Loss are measured and taken to endorse the performance of ICM and TPF-LEP.

Keywords:

Access point, dos attack, ICM, infrastructure network, MAC spoof, TPF-LEP,


References

  1. Bellardo, J. and S. Savage, 2003. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. Proceedings of the USENIX Security Symposium. Washington, D.C.
  2. Bicakci, K. and B. Tavli, 2009. Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Inter., 31: 931-941.
    CrossRef    
  3. Cam-Winget, N., R. Housley, D. Wagner and J. Walker, 2003. Security flaws in 802.11 data link protocols. Commun. ACM, 46(5).
    CrossRef    
  4. Durairaj, M., A. Persia and S. Sivagowry, 2013. A study of the existing solutions to prevent DoS attacks in wireless local area infrastructure networks. Int. J. Comput. Networks Secur., pp: 1123-1126.
  5. Ferreri, F., M. Bernaschi and L. Valcamonici, 2008. Access points vulnerabilities to DoS attacks in 802.11 networks. Wirel. Netw., 14: 159-169.
    CrossRef    
  6. Jalil, D., M. Mina, A. Abdul, G. Abdul and S. Shamala, 2008. An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks. Int. J. Comput. Sci. Network Secur., 8(8): 1-5.
  7. Lashkari, A.H., M.M.S. Danesh and B. Samadi, 2009. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT). Beijing, China, pp: 48-52.
  8. Nguyen, T.D., D Nguyen, B.N. Tran and H. Vu, 2008. A lightweight solution for defending against Deauthentication/disassociation attaks on 802.11 networks. Proceeding of 17th International Conference on Computer Communications and Networks (ICCCN '08), pp: 1-6.
    PMCid:PMC2803434    
  9. Persia, A., S. Sivagowry, B. Vani and L. Arockiam, 2011. Inhibition of denial of service attacks in WLAN using the integrated central manager. Int. J. Comput. Appl., 29(8): 28-33.
  10. Ping, D., 2007. Central manager: A solution to avoid denial of service attacks for wireless LANs. Int. J. Network Secur., 4(1): 35-44.
  11. Radomir, P. and S. Dejan, 2007. A survey of wireless security. J. Comput. Inform. Technol., 15(3): 237-255.
    CrossRef    
  12. Salem, M., A. Sarhan and M. Abu-Bakr, 2007. A DOS attack intrusion detection and inhibition technique for wireless computer networks. Proceeding of the International Congress for Global Science and Technology-CSIR, 7(1): 17-24.
    PMid:17270600    
  13. Shamala, S., M. Mina, A. Abdul, G. Abdul and D. Jalil, 2009. Vulnerability analysis of Extensible Authentication Protocol (EAP) DoS attack over wireless networks. ICGST Int. J. Comput. Network Internet Res. CNIR, 9(1): 39-46.
  14. Sivagowry, S., A. Persia, B. Vani and L. Arockiam, 2012. A Solution to prevent resource flooding attacks in 802.11 WLAN. Proceedings of the International Conference on Recent Trends in Computing, Communication and Information Technologies, pp: 607-616.
  15. Stanley, W., 2003. The Evolution of Wireless Security in 802.11 Networks: WEP, WPA and 802.11 Standards. GSEC Practical v1.4b.
  16. The ns Manual (formerly ns Notes and Documentation), 2009. The VINT Project a Collaboration between researchers at UC Berkeley, LBL, USC/ISI and Xerox PARC. Kevin Fall hkfall@ee.lbl.govi, Editor Kannan Varadhan hkannan@catarina.usc. edui, Editor, May 9, 2010, pp: 73.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved