Open Access Open Access  Restricted Access Subscription or Fee Access

Beacon Spoofing Attack: Impact and Security in Wireless Mesh Networks

Rupinder Cheema, Sanjeev Sofat, Divya Bansal

Abstract


Wireless Mesh Networks have become an inevitable choice for gaining network access as it offers ubiquitous connectivity and improved performance due to the flexibility, scalability, features that it provides. Along with all these functionalities come the threats and vulnerabilities especially due to the fact that in case of wireless mesh networks the mesh points and mesh access points are deployed at different locations and are connected through a wireless medium to the portal. This radio communication between the mesh entities may even be heard by the attacker. The attacker may spoofs and masquerades the unencrypted management frames, thus facilitating the launch of Denial of service attacks. Moreover different mesh points communicate with each other via the forwarding action that too is based on radio communication. So the mesh devices are also vulnerable to physical tamper besides all other kinds of attacks. There is imperative need for the techniques that may thwart all kinds of security attacks. In this paper we have analyzed the impact of the beacon spoofing attack and flooding attack over the Wireless Mesh Networks test bed and proposed a security algorithm to detect this attack.

Keywords


Beacon Spoofing, Denial of Service, Detection Algorithm, Flooding Attack, Spoofing, Wireless Mesh Networks

Full Text:

PDF

References


Stuart Compton, Charles Hornat. 802.11 Denial Of Service Attacks and Mitigation. SANS Institute InfoSec Reading Room, 14-18, May 17th 2007.

John Bellardo and Stefan Savage. Denial of Service Attacks: Real Vulnerabilities and Practical Solutions In the Proceedings of the 12TH USENIX Security Symposium Washington, D.C., U.S.A. Aug 4 -8, 2003.

N. Bisnik and A. Abouzeid, Delay and Throughput in Random Access Wireless Mesh Networks In the Proceedings Of IEEE International Conference on Communications (ICC 2006), vol.1, pp. 403 -408, Jun 2006.

Joshua Wright Detecting wireless LAN MAC Address spoofing, GCIH, CCNA, pp 1-5, Jan 21, 2003.

Asier Martinez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernandez, Jesus lizarraga, Ainhoa Serna and Inaki Velez. Beacon frame Spoofing Attack Detection in IEEE 802.11 Networks In the proceedings of the third international conference on Availability, Reliability and Security (ARES08), pp 520-522, Barcelona, 4-7th March 2008.

Jon Edney and William A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i, 480 pages, Addison Wesley, 2003, ISBN: 0-321-13620-9

Vikram Gupta, Srikanth Krishnamurthy, and Michalis Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks”, Proceedings of 2002 MILCOM Conference, Anaheim, CA, October 2002

Fanglu Guo and Tzi-cker Chiueh. Sequence Number Based MAC Address Spoof Detection in the book named Lecture Notes In Computer Science, pp 315-325, Volume 3858/2006, Springer Link.

Shakeel Ahmad Ghumman, Security in Wireless Mesh Networks , Thesis Report, Halnstead University , Sweden, June 2009.

Josephine Larsson, Ida Waller,Security in Wireless Networks: Vulnerabilities and Countermeasures ,Thesis Report, Blekinge Institute of Technology , Spring 2003.

Vital Mynampati, Dilip Kandula, Raghuram Garimilla, Kalyan Srinivas , Performance and Security of Wireless Mesh Networks, Thesis Report , Blekinge Institute of Technology ,June 2009.

D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti. Multilevel Monitoring and Detection Systems (MMDS). In the proceedings of the 15th Annual Computer Security Incident Handling Conference (FIRST), Ottawa, Canada June 22-27, 2003.

E. D Cardenas. MAC Spoofing {An Introduction. http://www.giac.org/practical/GSEC/Edgar Cardenas GSEC.pdf

J. Hall, M. Barbeau and E. Kranakis. Using Transceiver Prints for Anomaly Based Intrusion Detection. In Proceedings of 3rd IASTED, CIIT 2004, St. Thomas, US Virgin Islands, USA, November 22-24, 2004.

F. Robinson. 802.11i and WPA up Close. Network Computing, 2004.

Peter Egli, Product Manager Wireless & Networking Technologies,” Susceptibility of wireless devices to denial of service attacks”/http://www.netmodule.com

A. Gerkis and J. Purcell. A Survey of Wireless Mesh Networking Security Technology and Threats. Sans Infosec Reading Room, Sep 2006.

Wireless Mesh Networks /http://www.wikkipedia

White papers “Can Wireless LAN Denial of Service Attacks Be Prevented? “Understanding WLAN Vulnerabilities and their Countermeasures.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.