By Topic

Pseudo Randomized Sequence Number Based Solution to 802.11 Disassociation Denial of Service Attack

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Aslam, B. ; Nat. Univ. of Sci. & Technol., Rawalpindi ; Islam, M.H. ; Khan, S.A.

Wireless local area networks (WLAN) provide network connectivity and flexibility at a very low cost. Last two decades have seen the exponential growth in this area. Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999, which is the defacto wireless standard. Security flaws were soon detected in this standard, and as a result amendments / enhancements were introduced. IEEE 802.1 li a security enhancement, was ratified in 2004. It was designed to address wireless security issues however it also has some flaws and fails to achieve desired objectives especially availability. Unauthenticated management and control frames open the vulnerability of identity theft and are the main cause of Denial of Service (DoS) attacks. Spoofed disassociation messages can successfully be used to launch DoS attacks. In this paper we have explained the Spoofed disassociation DoS attack and proposed a robust solution to this attack.

Published in:

Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. Proceedings of the First

Date of Conference:

17-20 Sept. 2006