The modeling and comparison of wireless network denial of service attacks

Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock vulnerability in IEEE 802.11. The history of published denial of service attacks against wireless protocols indicates that formal methods can contribute to the construction of robust protocols.

[1]  John Mullins,et al.  Using Admissible Interference to Detect Denial of Service Vulnerabilities , 2003, IWFM.

[2]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[3]  Martin Eian,et al.  Fragility of the Robust Security Network: 802.11 Denial of Service , 2009, ACNS.

[4]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[5]  Martin Eian,et al.  A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP , 2010, CANS.

[6]  Frank Kargl,et al.  Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[7]  Gerard J. Holzmann,et al.  The SPIN Model Checker - primer and reference manual , 2003 .

[8]  Suratose Tritilanunt Protocol engineering for protection against denial-of-service attacks , 2009 .

[9]  Yao Zhao,et al.  Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+ , 2006, 2006 2nd IEEE Workshop on Secure Network Protocols.

[10]  Vitaly Shmatikov,et al.  Game-based analysis of denial-of-service prevention protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[11]  C. B. Sankaran,et al.  Network access security in next- generation 3GPP systems: A tutorial , 2009, IEEE Communications Magazine.

[12]  Catherine A. Meadows,et al.  A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[13]  Vijay Ramachandran Analyzing DoS-Resistance of Protocols Using a Cost-Based Framework , 2002 .

[14]  Jason Smith,et al.  Denial of service : prevention, modelling and detection , 2007 .

[15]  Ning Zhang,et al.  Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[16]  Georgios Kambourakis,et al.  Signaling-Oriented DoS Attacks in UMTS Networks , 2009, ISA.