DocumentCode :
1604489
Title :
Using Power Hopping to Counter MAC Spoof Attacks in WLAN
Author :
Nagarajan, Vijayakrishnan ; Arasan, Vetri ; Huang, Dijiang
Author_Institution :
Arizona State Univ., Tempe, AZ, USA
fYear :
2010
Firstpage :
1
Lastpage :
5
Abstract :
IEEE 802.11-based wireless LANs (WLANs) are deployed in public places, universities, offices and shops. The main reason for the popularity is convenience of internetworking without wires. The increase in WLANs also resulted in increase of security threats. One of these threats is spoofing MAC address. Some WLANs use MAC filtering to allow stations with registered MAC addresses to use the network. The attacker has many tools like AirJack, WireShark to capture the packets in WLAN and find authorized MAC address. The attacker masquerades as an authorized station and can launch denial of service attack. This paper presents a power hopping technique which can be used by access points (AP) to discern the authorized packets from the masquerading packets and thus deny the attacker from using the system.
Keywords :
telecommunication security; wireless LAN; AirJack; IEEE 802.11-based wireless LAN; MAC addresses; MAC spoof attacks; WireShark; access points; denial of service attack; power hopping; Access control; Authentication; Communications Society; Counting circuits; Cryptography; Internetworking; Joining processes; Power system modeling; Protocols; Wireless LAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-5175-3
Electronic_ISBN :
978-1-4244-5176-0
Type :
conf
DOI :
10.1109/CCNC.2010.5421588
Filename :
5421588
Link To Document :
بازگشت