scispace - formally typeset
Book ChapterDOI

Authentication – based medium access control to prevent protocol jamming: A-MAC

TLDR
This paper introduces Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems.
Abstract
Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it has inherent security weaknesses due to wireless characteristics. For this reason, security-sensitive groups are still unwilling to use WLAN. There are several types of attacks to degrade the wireless network throughput using security weakness, especially Protocol Jamming Attacks are critical. These attacks consume little energy and can be easily implemented. In this paper, we introduce Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming Attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems. The proposed scheme can authenticate frames using Universal Hashing Message Authentication Codes (UMAC-32) and Hidden Sequence Number (SN). A-MAC frequently changes the key and SN using shift row and shift column processes to overcome the weakness of short 32 bits hashing codes. A-MAC can achieve integrity, authentication, and anti-replay attack security features. It can prevent Protocol Jamming Attacks that degrade wireless network throughput. Our simulation shows A-MAC can sustain throughput under Protocol Jamming Attacks.

read more

Citations
More filters
Proceedings ArticleDOI

Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN

TL;DR: An adaptive rapid channel-hopping scheme using Dwell Window and a Deception Mechanism to mitigate smart jammer attacks and results show that the proposed scheme is more effective than prior studies.
Book ChapterDOI

Anti jamming - based medium access control using adaptive rapid channel hopping in 802.11: AJ-MAC

TL;DR: An Adaptive Rapid Channel Hopping method using Dwell Window to adjust transmission time based on the jammer's ability and a Deception Mechanism that is another novel concept to make a jammer attack an unnecessary channel for a high throughput and a low probability of detection.
References
More filters
Proceedings ArticleDOI

TinySec: a link layer security architecture for wireless sensor networks

TL;DR: TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Book

802.11 Wireless Networks: The Definitive Guide

TL;DR: After a general introduction to wireless networks, this practical book moves quickly into the gory details of the 802.11 standard, with clear, no-nonsense guide for using802.11 on Windows and Linux, using and selecting access points, making deployment considerations, and seeing to 802.
Proceedings Article

802.11 denial-of-service attacks: real vulnerabilities and practical solutions

TL;DR: This paper provides an experimental analysis of 802.11-specific attacks - their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.

UMAC: Message Authentication Code using Universal Hashing

Ted Krovetz
TL;DR: This specification describes how to generate an authentication tag using the UMAC message authentication algorithm, which is designed to be very fast to compute in software on contemporary uniprocessors.
Proceedings ArticleDOI

Rogue Access Point Based DoS Attacks against 802.11 WLANs

TL;DR: An integrated approach to applying traffic pattern filtering (TPF) over 802.11 w to resolve DeauthF and DisassF DoS attacks and results show that 802.
Related Papers (5)