publication . Preprint . 2016

Cascading Denial of Service Attacks on Wi-Fi Networks

Xin, Liangxiao; Starobinski, David; Noubir, Guevara;
Open Access English
  • Published: 18 Apr 2016
Abstract
We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis. The simulations show that the attack is effective both in networks operating under fixed and varying bit rates, as well as ad hoc and infrastructure modes. To gain insight ...
Subjects
free text keywords: Computer Science - Networking and Internet Architecture
Related Organizations
Funded by
NSF| TC: Large: Securing the Open Softphone
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 1012910
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
,
NSF| TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 1409453
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
,
NSF| TWC: Medium: Collaborative: Strengthening Wi-Fi Network Wide
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 1409053
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
Download from
30 references, page 1 of 2

[1] K. Lee, J. Lee, Y. Yi, I. Rhee, and S. Chong, “Mobile data offloading: how much can WiFi deliver?” in Proceedings of the 6th International Conference. ACM, 2010, p. 26.

[2] Cisco, “Cisco cleanair technology.”

[3] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal on Selected Areas in Communication, vol. 18, no. 3, pp. 535-547, 2000.

[4] A. Forouzan Behrouz, “Data communication and networking,” 3rd/4th Edition, Tata McGraw, 2004.

[5] M. Gast, 802.11 wireless networks: the definitive guide. ” O'Reilly Media, Inc.”, 2005.

[6] http://documentation.netgear.com/WPN824EXT/enu/202-10310- 02/WPN824EXT UG-4-6.html.

[7] http://www.tp-link.com/resources/document/TD-W8901N V1 User Guide 191001.pdf.

[8] http://ui.linksys.com/WAG300N/1.01.01/help/h AdvWSettings.htm.

[9] http://support.dlink.com/emulators/dir855/Advanced.html.

[10] R. Poisel, Modern communications jamming principles and techniques. Artech House Publishers, 2011.

[11] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service attacks in wireless networks: The case of jammers,” Communications Surveys & Tutorials, IEEE, vol. 13, no. 2, pp. 245-257, 2011.

[12] G. Lin and G. Noubir, “On link layer denial of service in data wireless LANs,” Wireless Communications and Mobile Computing, vol. 5, no. 3, pp. 273-284, 2005.

[13] G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, “On the robustness of ieee 802.11 rate adaptation algorithms against smart jamming,” in Proceedings of the fourth ACM conference on Wireless network security. ACM, 2011, pp. 97-108.

[14] C. Orakcal and D. Starobinski, “Jamming-resistant rate adaptation in wi-fi networks,” Performance Evaluation, vol. 75, pp. 50-68, 2014. [OpenAIRE]

[15] C. Chen, H. Luo, E. Seo, N. H. Vaidya, and X. Wang, “Rate-adaptive framing for interfered wireless networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. IEEE, 2007, pp. 1325-1333.

30 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue