• DocumentCode
    589794
  • Title

    PCPD: A novel illustration of pivotal parameters of an attack for security systems: Case study on IEEE 802.11 MAC layer misbehavior

  • Author

    Modaresi, A. ; Koozehkanani, Ziaddin Daei ; Zolfy, M.

  • Author_Institution
    Fac. of Electr. & Comput. Eng., Univ. of Tabriz, Tabriz, Iran
  • fYear
    2012
  • fDate
    13-14 Sept. 2012
  • Firstpage
    141
  • Lastpage
    146
  • Abstract
    To confront an attack, a good strategy may save the cost and time. When Detecting and reacting is known to handle predictable naïve attacks, prevention strategies should be used to deal with smart unknown ones. These are defined types of misbehavior in wireless MAC layer protocols. To study MAC layer misbehavior in IEEE 802.11 networks more systematically, we defined a framework named PCPD. This methodology introduces four parameters, Possibility, Cost, Profit, and Damage to delineate any assumed attack or threat. By studying these parameters together, it becomes clear what are the most probable and considerable misbehaviors, how much damage they can make, what are profits and cost of such a behavior for the hostile host, and so how much essential is to tackle it. Comparison of PCPD parameters for different types of misbehavior results in a comprehensible identification of their severity, network´s reliability, and network´s weak points. By recognizing these parameters one can easily go through designing an accurate handling method for any threat.
  • Keywords
    authorisation; computer network security; wireless LAN; IEEE 802.11 MAC layer misbehavior; IEEE 802.11 network; MAC layer misbehavior; PCPD framework; cost parameter; damage parameter; medium access control; network reliability; possibility parameter; predictable naive attack; profit parameter; security system attack; Communication system security; IEEE 802.11 Standards; Media Access Protocol; Security; Wireless networks; Cost; Damage of an attack; IEEE 802.11; MAC layer misbehavior; PCPD; Probability; Profit; detection; prevention method; reaction; wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
  • Conference_Location
    Tabriz
  • Print_ISBN
    978-1-4673-2387-1
  • Type

    conf

  • DOI
    10.1109/ISCISC.2012.6408209
  • Filename
    6408209