DocumentCode
589794
Title
PCPD: A novel illustration of pivotal parameters of an attack for security systems: Case study on IEEE 802.11 MAC layer misbehavior
Author
Modaresi, A. ; Koozehkanani, Ziaddin Daei ; Zolfy, M.
Author_Institution
Fac. of Electr. & Comput. Eng., Univ. of Tabriz, Tabriz, Iran
fYear
2012
fDate
13-14 Sept. 2012
Firstpage
141
Lastpage
146
Abstract
To confront an attack, a good strategy may save the cost and time. When Detecting and reacting is known to handle predictable naïve attacks, prevention strategies should be used to deal with smart unknown ones. These are defined types of misbehavior in wireless MAC layer protocols. To study MAC layer misbehavior in IEEE 802.11 networks more systematically, we defined a framework named PCPD. This methodology introduces four parameters, Possibility, Cost, Profit, and Damage to delineate any assumed attack or threat. By studying these parameters together, it becomes clear what are the most probable and considerable misbehaviors, how much damage they can make, what are profits and cost of such a behavior for the hostile host, and so how much essential is to tackle it. Comparison of PCPD parameters for different types of misbehavior results in a comprehensible identification of their severity, network´s reliability, and network´s weak points. By recognizing these parameters one can easily go through designing an accurate handling method for any threat.
Keywords
authorisation; computer network security; wireless LAN; IEEE 802.11 MAC layer misbehavior; IEEE 802.11 network; MAC layer misbehavior; PCPD framework; cost parameter; damage parameter; medium access control; network reliability; possibility parameter; predictable naive attack; profit parameter; security system attack; Communication system security; IEEE 802.11 Standards; Media Access Protocol; Security; Wireless networks; Cost; Damage of an attack; IEEE 802.11; MAC layer misbehavior; PCPD; Probability; Profit; detection; prevention method; reaction; wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location
Tabriz
Print_ISBN
978-1-4673-2387-1
Type
conf
DOI
10.1109/ISCISC.2012.6408209
Filename
6408209
Link To Document