Analysis and Improvements over DoS Attacks against IEEE 802.11i Standard

To improve the ability of system providing service when encounter malicious invasion, a new model of tolerance invasion system is given based on dynamic threshold encryption. The real-time detection of the model is realized by the Collaboration between servers and hosts. The sensitive data in the system apply dynamic threshold encryption, and can change their share with the distribution. The model has such as distribution, self-adaptability, fault tolerance, dynamic and expansibility features to ensure that the system has a higher level of safety.

[1]  S.A. Khan,et al.  Pseudo Randomized Sequence Number Based Solution to 802.11 Disassociation Denial of Service Attack , 2006, 2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference.

[2]  P. Nobles,et al.  Vulnerability of IEEE802.11 WLANs to MAC laver DoS attacks , 2004 .

[3]  T.N. Nguyen,et al.  A lightweight solution for Wireless LAN: Letter-envelop protocol , 2008, 2008 Third International Conference on Communications and Networking in China.

[4]  N. Manivannan,et al.  Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).

[5]  David R. Cheriton,et al.  DoS and authentication in wireless public access networks , 2002, WiSE '02.

[6]  James Yu,et al.  A Solution to WLAN Authentication and Association DoS Attacks , 2007 .

[7]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[8]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[9]  Monis Akhlaq,et al.  802.11 disassociation DoS attack simulation using Verilog , 2008 .

[10]  M.A. Khan,et al.  Pseudo Random Number Based authentication to counter denial of service attacks on 802.11 , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[11]  Chris Imafidon,et al.  Addressing the vulnerability of the 4-way handshake of 802.11i , 2008, 2008 Third International Conference on Digital Information Management.

[12]  John C. Mitchell,et al.  Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.

[13]  Hyunseung Choo,et al.  A Robust Session Key Distribution in 802.11i , 2008, 2008 International Conference on Computational Sciences and Its Applications.

[14]  Kouichi Sakurai,et al.  Key Distribution Scheme Using Matched Filter Resistant against DoS Attack , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).