Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

<p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> att...

Full description

Bibliographic Details
Main Authors: De Rango Floriano, Lentini Dionigi Cristian, Marano Salvatore
Format: Article
Language:English
Published: SpringerOpen 2006-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Online Access:http://jwcn.eurasipjournals.com/content/2006/047453
id doaj-52a8563449b94687869476a51592a49f
record_format Article
spelling doaj-52a8563449b94687869476a51592a49f2020-11-24T20:48:00ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992006-01-0120061047453Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11iDe Rango FlorianoLentini Dionigi CristianMarano Salvatore<p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> attacks are outlined. The last phase of the authentication process, represented by the <it>4-way handshake</it> procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.</p> http://jwcn.eurasipjournals.com/content/2006/047453
collection DOAJ
language English
format Article
sources DOAJ
author De Rango Floriano
Lentini Dionigi Cristian
Marano Salvatore
spellingShingle De Rango Floriano
Lentini Dionigi Cristian
Marano Salvatore
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
EURASIP Journal on Wireless Communications and Networking
author_facet De Rango Floriano
Lentini Dionigi Cristian
Marano Salvatore
author_sort De Rango Floriano
title Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
title_short Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
title_full Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
title_fullStr Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
title_full_unstemmed Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
title_sort static and dynamic 4-way handshake solutions to avoid denial of service attack in wi-fi protected access and ieee 802.11i
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2006-01-01
description <p/> <p>This paper focuses on <it>WPA</it> and <it>IEEE 802.11i</it> protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a <it>DoS attack</it> and <it>DoS flooding</it> attacks are outlined. The last phase of the authentication process, represented by the <it>4-way handshake</it> procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.</p>
url http://jwcn.eurasipjournals.com/content/2006/047453
work_keys_str_mv AT derangofloriano staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i
AT lentinidionigicristian staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i
AT maranosalvatore staticanddynamic4wayhandshakesolutionstoavoiddenialofserviceattackinwifiprotectedaccessandieee80211i
_version_ 1716809211055177728