A Novel Proof of Work Model Based on Pattern Matching to Prevent DoS Attack

One of the most common types of denial of service attack on 802.11 based networks is resource depletion at AP side. APs meet such a problem through receiving flood probe or authentication requests which are forwarded by attackers whose aim are to make AP unavailable to legitimate users. The other most common type of DoS attack takes advantage of unprotected management frame. Malicious user sends deauthentication or disassociation frame permanently to disrupt the network. However 802.11w has introduced a new solution to protect management frames using WPA and WPA2, they are unprotected where WEP is used. This paper focuses on these two common attacks and proposes a solution based on letter envelop protocol and proof-of-work protocol which forces the users to solve a puzzle before completing the association process with AP. The proposed scheme is also resistant against spoofed puzzle solutions attack.

[1]  Wu-chi Feng,et al.  Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[3]  Byoung Uk Kim,et al.  Performance analysis Toolset for wireless intrusion detection systems , 2010, 2010 International Conference on High Performance Computing & Simulation.

[4]  Matthew S. Gast,et al.  802.11 Wireless Networks: The Definitive Guide , 2002 .

[5]  Srinivas Sampalli,et al.  Client-based intrusion prevention system for 802.11 wireless LANs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[6]  T.N. Nguyen,et al.  A lightweight solution for Wireless LAN: Letter-envelop protocol , 2008, 2008 Third International Conference on Communications and Networking in China.

[7]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[8]  Shi Ting,et al.  Design and analysis of a wireless authentication protocol against DoS attacks based on Hash function , 2006 .

[9]  Udo W. Pooch,et al.  A secure dynamic cryptographic and encryption protocol for wireless networks , 2009, IEEE EUROCON 2009.

[10]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[11]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[12]  A. Celik,et al.  Improving the security of wireless LANs by managing 802.1x disassociation , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[13]  Taieb Znati,et al.  A Guided Tour Puzzle for Denial of Service Prevention , 2009, 2009 Annual Computer Security Applications Conference.

[14]  Zhang Laishun,et al.  A Client Puzzle Based Defense Mechanism to Resist DoS Attacks in WLAN , 2010, 2010 International Forum on Information Technology and Applications.

[15]  Lin Gao,et al.  A new client-puzzle based DoS-resistant scheme of IEEE 802.11i wireless authentication protocol , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.

[16]  Seungjoo Kim,et al.  Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.

[17]  Neeraj Mittal,et al.  A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[18]  Chung-Hsin Liu,et al.  The Analysis for DoS and DDoS Attacks of WLAN , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[19]  Matthew S Gast 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .

[20]  Jacques Patarin,et al.  Benes and Butterfly Schemes Revisited , 2005, ICISC.

[21]  Heba Kamal Aslan,et al.  WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).