Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
<p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> att...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2006-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Online Access: | http://jwcn.eurasipjournals.com/content/2006/047453 |
id |
doaj-52a8563449b94687869476a51592a49f |
---|---|
record_format |
Article |
spelling |
doaj-52a8563449b94687869476a51592a49f2020-11-24T20:48:00ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992006-01-0120061047453Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11iDe Rango FlorianoLentini Dionigi CristianMarano Salvatore<p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> attacks are outlined. The last phase of the authentication process, represented by the <it>4-way handshake</it> procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.</p> http://jwcn.eurasipjournals.com/content/2006/047453 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
De Rango Floriano Lentini Dionigi Cristian Marano Salvatore |
spellingShingle |
De Rango Floriano Lentini Dionigi Cristian Marano Salvatore Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i EURASIP Journal on Wireless Communications and Networking |
author_facet |
De Rango Floriano Lentini Dionigi Cristian Marano Salvatore |
author_sort |
De Rango Floriano |
title |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i |
title_short |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i |
title_full |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i |
title_fullStr |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i |
title_full_unstemmed |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i |
title_sort |
static and dynamic 4-way handshake solutions to avoid denial of service attack in wi-fi protected access and ieee 802.11i |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2006-01-01 |
description |
<p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> attacks are outlined. The last phase of the authentication process, represented by the <it>4-way handshake</it> procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.</p> |
url |
http://jwcn.eurasipjournals.com/content/2006/047453 |
work_keys_str_mv |
AT derangofloriano staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i AT lentinidionigicristian staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i AT maranosalvatore staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i |
_version_ |
1716809211055177728 |