Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC

In this paper, we focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we deal with some hidden vulnerabilities based on the control packets CTS(Clear to Send) andACK. Through these vulnerabilities, we show two new smart attacks which were not dealt by the solutions proposed recently like the attack based on theRTS(Request to Send) packet vulnerability. The malicious node can exploit these vulnerabilities on the MAC protocol, in order to corrupt the monitoring and routing processes. Furthermore, we demonstrate the attacks through algorithms and we show how vulnerabilities can be exploited and how these attacks can be implemented by the attacker. The impact of these attacks is presented through simulation and implementation. Simulation and exprimental results show the impact of the attacks on the network. In addition, the experimental results demonstrate the feasibility of these real attacks and their exploitation. These experimentations allow us to confirm the simulation’s results. Furthermore, in order to prevent these attacks, the solutions based on control packet authentication are presented. We propose two kinds of the solution one is cryptography independent and the other one is cryptography dependent. The evaluation and analysis of these solutions are investigated by analytic and simulations analysis. The simulations’ results of the proposed solution show that the attacks are prevented and the negative impacts are significantly reduced. In addition, the security cost of the proposed solutions are investigated. Hence, the security costs are insignificant in comparison with the negative impact of these attacks. Copyright c © 2008 John Wiley & Sons, Ltd.

[1]  David Starobinski,et al.  RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[2]  P. Gburzynski,et al.  Hidden Problems with the Hidden Node Problem , 2006, 23rd Biennial Symposium on Communications, 2006.

[3]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[4]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[5]  Chadi Assi,et al.  Enhancing IEEE 802.11 Random Backoff in Selfish Environments , 2008, IEEE Transactions on Vehicular Technology.

[6]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[7]  Sarvar Patel,et al.  An Efficient MAC for Short Messages , 2002, Selected Areas in Cryptography.

[8]  Abderrahim Benslimane,et al.  A Secure Architecture for Mobile Ad Hoc Networks , 2006, MSN.

[9]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[10]  Mario Gerla,et al.  Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks , 2003, Ad Hoc Networks.

[11]  Vaduvur Bharghavan,et al.  MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.

[12]  P. Karn,et al.  MACA-a New Channel Access Method for Packet Radio , 1990 .

[13]  Chadi Assi,et al.  A Confident Community to Secure Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[14]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).