Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.5.89

DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake  

Kim, Jung-Yoon (Sungkyunkwan University)
Kim, In-Hwan (LG Electronics)
Choi, Hyoung-Kee (Sungkyunkwan University)
Abstract
Wireless LAN (WLAN) is type of wireless service that has higher data transmission than current cellular networks. The usage is continually increasing. There are a lot of vulnerabilities in wireless network, due to the properties of the wireless environment, regardless of its popularity. IEEE announced the 802.11i security standard to solve these problems. The vulnerable point of messages used in the process of key distribution for 802.11i makes the target node attacked lose memory through continuous messages and blocks the legitimate WLAN service. In this paper, we proposed new schemes to solve this problem and compared our proposals with the current process. The proposed protocol eliminates the memory exhaustion problem on the client side by using methods for reduction of memory usage.
Keywords
4-way handshake; 802.11i; wlan security; denial of services; security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Changhua He and John C. Mitchell. "Security analysis and improvements for IEEE 802.11i," The 12th Annual Network and Distributed System Security Symposium, pp. 90-110, Feb. 2005.
2 Hayriye Altunbasak and Henry Owen, "Alternative Pair-wise Key Exchange Protocols for Robust Security Networks (IEEE 802.11i) in Wireless LANs," IEEE SoutheastCon, pp. 77-83, Mar. 2004.
3 Romano Fantacci, Leonardo Maccari, and Tommaso Pecorella, "Analysis of Secure Handover for IEEE 802.1x-Based Wireless Ad Hoc Networks," Wireless Communications, vol. 14, no. 5, pp. 21-29, Oct. 2007.   DOI
4 Jing Liu, Xinming Ye, Jun Zhang, and Jun Li, "Security verification of 802.11i 4-way handshake protocol," ICC 2008, pp. 1642-1647, May 2008.
5 M. Jagetia and T. Kocak, "A novel scrambling algorithm for a robust WEP implementation," Vehicular Technology Conference(VTC) 2004-Spring, pp. 2487- 2491, May 2004.
6 IEEE Computer Society, "Port-Based Network Access Control", IEEE Std 802.1X-2010, Feb. 2010.
7 IEEE Computer Society, "Wireless Medium Access Control(MAC) and Physical Layer(PHY) Specification : Medium Access Control(MAC) Security Enhancements", IEEE Std 802.11i/D4.1, Jul. 2003.
8 Changhua He and John C. Mitchell, "Analysis of the 802.11i 4-Way Handshake," Proceeding of the Third ACM International Workshop on Wireless Security, pp. 43-50, Oct. 2004.
9 http://open1x.sourceforge.net
10 http://hostap.epitest.fi
11 C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, 2nd Ed., Upper Saddle River: Prentice Hall PTR, 2002, ch. 2-3.
12 W. Eddy, "TCP SYN Flooding Attacks and Common Mitigations," RFC 4987, Aug. 2007.
13 Kemal Bicakci and Bulent Tavli, "Denial- of-service attacks and countermeasures in IEEE 802.11 wireless networks," Computer Standards & Interfaces, vol. 31, no. 5, pp. 931-941, Sep. 2009.   DOI   ScienceOn
14 Sung-Hyun Eum, Sung-Jae Cho, Hyoung- Kee Choi, and Hyunseung Choo, "A Robust Session Key Distribution in 802.11i," ICCSA 2008, pp. 201-206, Jun. 2008.