skip to main content
10.1145/2043106.2043113acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

The modeling and comparison of wireless network denial of service attacks

Published: 23 October 2011 Publication History

Abstract

Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock vulnerability in IEEE 802.11. The history of published denial of service attacks against wireless protocols indicates that formal methods can contribute to the construction of robust protocols.

References

[1]
Bellardo, J., and Savage, S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium (Berkeley, CA, USA, 2003), USENIX Association.
[2]
Eian, M. Fragility of the robust security network: 802.11 denial of service. In Proceedings of the 7th International Conference on Applied Cryptography and Network Security (2009), vol. 5536 of Lecture Notes in Computer Science, Springer-Verlag, pp. 400--416.
[3]
Eian, M. A practical cryptographic denial of service attack against 802.11i TKIP and CCMP. In Proceedings of the Ninth International Conference on Cryptology And Network Security (2010), vol. 6467 of Lecture Notes in Computer Science, Springer-Verlag, pp. 62--75.
[4]
Han, T., Zhang, N., Liu, K., Tang, B., and Liu, Y. Analysis of mobile WiMAX security: Vulnerabilities and solutions. In Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008, 5th IEEE International Conference on (2008), pp. 828--833.
[5]
Holzmann, G. Spin model checker, the: primer and reference manual, first ed. Addison-Wesley Professional, 2003.
[6]
IEEE. IEEE Std 802.11g-2003. New York, NY, USA, 2003.
[7]
IEEE. IEEE Std 802.11h-2003, IEEE 802.11-1999 Amendment 5: Spectrum and Transmit Power Management Extensions in the 5 GHz band in Europe. New York, NY, USA, 2003.
[8]
IEEE. IEEE Std 802.11i-2004, IEEE 802.11-1999 Amendment 6: Medium Access Control (MAC) Security Enhancements. New York, NY, USA, 2004.
[9]
IEEE. IEEE Std 802.11-2007, IEEE Standard for Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. New York, NY, USA, 2007.
[10]
Kambourakis, G., Kolias, C., Gritzalis, S., and Hyuk-Park, J. Signaling-oriented DoS attacks in UMTS networks. In Advances in Information Security and Assurance, vol. 5576 of Lecture Notes in Computer Science. Springer-Verlag, 2009, pp. 280--289.
[11]
Könings, B., Schaub, F., Kargl, F., and Dietzel, S. Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard. In LCN 2009: Proceedings of the IEEE 34th Conference on Local Computer Networks (2009), pp. 14--21.
[12]
Lafrance, S., and Mullins, J. Using admissible interference to detect denial of service vulnerabilities. In Sixth International Workshop in Formal Methods. Electronic Workshops in Computing (eWiC) by British Computer Society (BCS) (2003), pp. 1--19.
[13]
Mahimkar, A., and Shmatikov, V. Game-based analysis of denial-of-service prevention protocols. In Proceedings of the 18th IEEE workshop on Computer Security Foundations (Washington, DC, USA, 2005), IEEE Computer Society, pp. 287--301.
[14]
Malinen, J. hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator, 2011. http://hostap.epitest.fi/hostapd.
[15]
Malinen, J. Linux WPA/WPA2/IEEE 802.1X Supplicant, 2011. http://hostap.epitest.fi/wpa supplicant.
[16]
Meadows, C. A formal framework and evaluation method for network denial of service. IEEE Computer Security Foundations Workshop 00 (1999), 4.
[17]
Narayana, P., Chen, R., Zhao, Y., Chen, Y., Fu, Z., and Zhou, H. Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+. In Secure Network Protocols, 2006. 2nd IEEE Workshop on (2006), pp. 44--49.
[18]
Pelechrinis, K., Iliofotou, M., and Krishnamurthy, V. Denial of service attacks in wireless networks: The case of jammers. Communications Surveys Tutorials, IEEE PP, 99 (2010), 1--13.
[19]
Ramachandran, V. Analyzing DoS-resistance of protocols using a cost-based framework. Tech. rep., Yale University, 2002.
[20]
Sankaran, C. Network access security in next-generation 3GPP systems: A tutorial. Communications Magazine, IEEE 47, 2 (2009), 84--91.
[21]
Smith, J. Denial of Service: Prevention, Modelling and Detection. Brisbane, Australia, 2007. PhD Thesis, Queensland University of Technology.
[22]
Tritilanunt, S. Protocol engineering for protection against denial-of-service attacks. Brisbane, Australia, 2009. PhD Thesis, Queensland University of Technology.

Cited By

View all
  • (2022)Securing IoT Devices by Exploiting Backscatter Propagation SignaturesIEEE Transactions on Mobile Computing10.1109/TMC.2021.308475421:12(4595-4608)Online publication date: 1-Dec-2022
  • (2022)A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networksEngineering Science and Technology, an International Journal10.1016/j.jestch.2021.09.01131(101065)Online publication date: Jul-2022
  • (2020)Authenticating On-Body IoT Devices: An Adversarial Learning ApproachIEEE Transactions on Wireless Communications10.1109/TWC.2020.299111119:8(5234-5245)Online publication date: Aug-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiHeld '11: Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds
October 2011
64 pages
ISBN:9781450309806
DOI:10.1145/2043106
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

SOSP '11
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Securing IoT Devices by Exploiting Backscatter Propagation SignaturesIEEE Transactions on Mobile Computing10.1109/TMC.2021.308475421:12(4595-4608)Online publication date: 1-Dec-2022
  • (2022)A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networksEngineering Science and Technology, an International Journal10.1016/j.jestch.2021.09.01131(101065)Online publication date: Jul-2022
  • (2020)Authenticating On-Body IoT Devices: An Adversarial Learning ApproachIEEE Transactions on Wireless Communications10.1109/TWC.2020.299111119:8(5234-5245)Online publication date: Aug-2020
  • (2020)Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)10.1109/ICUMT51630.2020.9222444(78-81)Online publication date: Oct-2020
  • (2016)S2M: A Lightweight Acoustic Fingerprints based Wireless Device Authentication ProtocolIEEE Internet of Things Journal10.1109/JIOT.2016.2619679(1-1)Online publication date: 2016
  • (2015)Wireless Device Authentication Using Acoustic Hardware FingerprintsBig Data Computing and Communications10.1007/978-3-319-22047-5_16(193-204)Online publication date: 24-Jul-2015
  • (2013)A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current TechniquesInterdisciplinary Information Sciences10.4036/iis.2013.17319:2(173-200)Online publication date: 2013
  • (2013)SecureArrayProceedings of the 19th annual international conference on Mobile computing & networking10.1145/2500423.2500444(441-452)Online publication date: 30-Sep-2013
  • (2013)Detection of Masqueraded Wireless Access Using 802.11 MAC Layer FingerprintsDigital Forensics and Cyber Crime10.1007/978-3-642-39891-9_18(283-301)Online publication date: 2013
  • (2012)A formal analysis of IEEE 802.11w deadlock vulnerabilities2012 Proceedings IEEE INFOCOM10.1109/INFCOM.2012.6195841(918-926)Online publication date: Mar-2012

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media