Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802 . 11 Systems

Network survivability is fundamental to information security. Adversaries could compromise network functionality by attacking the physical layer, the medium access control (MAC) layer, or the network layer. Even though security mechanisms for the network layer have been extensively discussed, MAC layer security has not been deeply explored. Leveraging security flaws in the IEEE 802.11 MAC protocol and the salient features of a Mobile Ad Hoc Network (MANET), even an average person with limited knowledge of wireless networks can launch MAClayer denial of service (DOS) attacks. In this paper, we study two types of MAC layer DOS attacks that can be easily employed by an average person: attacks launched from a single adversary by injecting enormous data flows into the network, and attacks launched from two colluding adversaries by sending enormous data flows directly to each other. We propose new counter measures to defend against these two types of DOS attacks. Since this paper focuses on MAC layer DOS attacks that could be easily executed by an average person, and compromising legitimate nodes is not an easy task, we only consider DOS attacks launched directly from adversaries, instead of from compromised nodes.

[1]  Thomas D. Burd,et al.  Processor design for portable systems , 1996, J. VLSI Signal Process..

[2]  Justin Dolskeinterhack,et al.  A Brute Force Search of DES KeyspaceMatt Curtin , 1997 .

[3]  Thomas D. Burd,et al.  The simulation and evaluation of dynamic voltage scaling algorithms , 1998, Proceedings. 1998 International Symposium on Low Power Electronics and Design (IEEE Cat. No.98TH8379).

[4]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[6]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[7]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[8]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[9]  Mario Gerla,et al.  How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[10]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[11]  Danny Dhillon,et al.  Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).