The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumption of confidentiality and availability. While the secu rity flaws in 802.11’s basic confidentially mechanisms have been widely publicized, the threats to network availability are far less widely appreciated. In fact, it has been suggested that 802.11 is highly suscepti ble to malicious denial-of-service (DoS) attacks tar geting its management and media access protocols. This paper provides an experimental analysis of such 802.11-specific attacks – their practicality, their ef ficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.
[1]
Adi Shamir,et al.
Weaknesses in the Key Scheduling Algorithm of RC4
,
2001,
Selected Areas in Cryptography.
[2]
D. L. Lough,et al.
A taxonomy of computer attacks with applications to wireless networks
,
2001
.
[3]
David R. Cheriton,et al.
DoS and authentication in wireless public access networks
,
2002,
WiSE '02.
[4]
John Ioannidis,et al.
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
,
2002,
NDSS.
[5]
Michalis Faloutsos,et al.
Denial of service attacks at the MAC layer in wireless ad hoc networks
,
2002,
MILCOM 2002. Proceedings.