A Survey of Different Dos Attacks on Wireless Network (original) (raw)

DoS Attack in Wireless Network

IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.

An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks

IJCSNS, 2008

In recent years, wireless LAN (WLAN) has gained popularity in a variety of locations. This has lead to development of high level security protocols for WLAN. The newest protocol IEEE 802.11i ratified to provide strong data encryption but it can not prevent Denial of Service (DoS) attacks on WLAN. This paper in a testbed, conducts an experimental framework to implement and quantify common types of DoS attacks against WLAN throughput. The results of implementation of our experiments shows that how easily DoS attacks can be performed on WLAN which causes to reduce throughput of communication considerably to make inaccessible wireless connection for its authorized members.

Access points vulnerabilities to DoS attacks in 802.11 networks

Wireless Networks, 2008

We describe possible denial of service attacks to access points in infrastructure wireless networks using the 802.11b protocol. To carry out such attacks, only commodity hardware and software components are required. The experimental results obtained on a large set of different access points show that serious vulnerabilities exist in any device we tested and that a single malicious station can easily hinder any legitimate communication within a basic service set.

Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure

Journal of theoretical and applied information technology, 2015

, Wireless networks are very common today because of their flexibility, portability and ease of installation. Users working through wireless connections have to be aware of the environments due to the vulnerability of the infrastructure and various types of attacks that can be made by the intruders to compromise valuable and critical data. Denial of Service attack (DOS) is the most significant attack in the wireless 802.11 WLANs. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) security protocols are used to protect wireless network infrastructure against intruders. Despite remarkable advances, both WEP and WPA protocols still suffer from DOS attack because their management and control frame is not encrypted. Integrated Central Manager (ICM) algorithm was proposed to detect and prevent DOS attacks. However, in ICM, time needed to detect DOS attack is too long. The algorithm maintains five tables for observing activities in the network. When a client requests for a connection, all the five tables needs to be processed; this is increases both network overhead and latency. In This paper, we proposed an algorithm called Enhanced Integrated Central Manager (EICM) to enhance DOS detection and prevention time. The algorithm was evaluated by gathering MAC addresses using Wireshark software and MATLAB was used for simulation. The obtained results demonstrate that that the proposed algorithm outperforms its predecessor in terms of DOS detection and prevention time by decreasing network overhead.

IJERT-Analysis of DoS Attack in Wireless Sensor Network

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/analysis-of-dos-attack-in-wireless-sensor-network https://www.ijert.org/research/analysis-of-dos-attack-in-wireless-sensor-network-IJERTV3IS091106.pdf Security is a vital issue in a wireless sensor networks. This is because of the fact that such networks are basically placed in hostile environments like surveillance;it has many military applications also.Security not only deals with protecting the networks but also includes detection of various attacks and their prevention.This paper would focus mainly denial of service attack and its prevention measures .Further we would experiment with the help of simulator to test the validity of our results.

DOS Attacks on WSN and Their Classifications With Countermeasures - A Survey

2016

Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and wearable devices that have processing and communication modules to monitor physical and environmental conditions. Currently millions of these type of smart devices serving in many fields like military, environment, and health services. Due to their unique deployment places even in hostile territories WSN are subject to various kinds of attacks. Self configuration, autonomous device addition, network connection and resource limitation are the main features of WSN that makes it highly prone to network attacks. Denial of Service (DoS) attacks which targets the availability of a WSN system is one of the most potent threat to which a WSN must be resilient in order to continue operations. This studies aim to analyze and classify the WSN DoS threats and their countermeasures. Based on the survey we present the best approach to designing a WSN resilient against DoS attacks.

A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks.doc

Wireless networks provide an easier way of communication to its users. Network without infrastructure are more flexible in deployment. Ad hoc networks are such networks that do not require a planned infrastructure during its establishment. Network with many advantages also have shortcomings. Ad hoc networks have resource constraints like limited bandwidth, battery power, short communication range, less computation power, open channel, short life time. These characteristics of ad hoc networks make them vulnerable for attacks. A malicious node, either from outside or from inside of network, may tries to disturb the network operations and try to consume network resources. Such attacks are called Denial of Services (DoS) attacks. These are more dangerous attacks among the others. They are not easily identifiable. A Denial of Service (DoS) attacker tries to vanish the resources of genuine users of network to make them unavailable for the network. The focus of this paper is to outline various types of DoS attacks. It also includes the effect of attack on node and network services. Later it gives the defense mechanism suggested by researchers for DoS attack and the other security measures that can be incorporates to avoid such attacks.

DoS Attacks in Wireless Sensor Network: A Survey

IJSRD, 2014

Wireless Sensor Networks are characterized as computational and energy resources & an ad hoc operational environment. Wireless Sensor Networks are used in many applications include the monitoring of sensitive information so security is prime issue. This paper examines the possible potential attacks on sensor network. Owing to the wireless communication‟s broadcast nature, wireless sensor networks are vulnerable to denial of service attacks. This paper also provides the qualitative analysis of different types of attacks in DOS.

Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks

Computer Standards & Interfaces, 2009

Security MAC Jamming Interference IEEE 802.11 access points deployed in shopping malls, university campuses, crowded streets, airports, and many other locations provide ubiquitous Internet access to millions of stations. However, these hot spots are vulnerable to Denial-of-Service (DoS) attacks due to the broadcast nature of wireless communication. It does not require specialized hardware or particularly high level of experience to render 802.11 networks inoperable through DoS attacks. Standard off-the-shelf equipment is sufficient for a malicious station to disrupt the service between access points and stations. In this paper we present a systematic survey of DoS attacks, which exploits MAC and physical layer vulnerabilities of 802.11 networks. Available countermeasures against DoS attacks are discussed and compared. Future research directions and open issues are also discussed.