Title :
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
Author :
Soryal, Joseph ; Perera, Irippuge Milinda ; Darwish, Ihab ; Fazio, Nelly ; Gennaro, Rosario ; Saadawi, Tarek
Author_Institution :
City Coll., CUNY, New York, NY, USA
Abstract :
The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access the Internet via Wi-Fi wireless networks or communicate with one another directly in a peer-to-peer mode. Insider attacks are those originating from a trusted node that had initially passed all the authentication steps to access the network and then got compromised. A trusted node that has turned rogue can easily perform Denial-of-Service (DoS) attacks on the Media Access Control (MAC) layer by illegally capturing the channel and preventing other legitimate nodes from communicating with one another. Insider attackers can alter the implementation of the IEEE 802.11 Distributed Coordination Function (DCF) protocol residing in the Network Interface Card (NIC) to illegally increase the probability of successful packet transmissions into the channel at the expenses of nodes that follow the protocol standards. The attacker fools the NIC to upgrade its firmware and forces in a version containing the malicious code. In this paper, we present a distributed solution to detect and isolate the attacker in order to minimize the impact of the DoS attacks on the network. Our detection algorithm enhances the DCF firmware to enable honest nodes to monitor each other´s traffic and compare their observations against honest communication patterns derived from a two-dimensional Markov chain. A channel hopping scheme is then used on the physical layer (PHY) to evade the attacker. To facilitate communication among the honest member stations and minimize network downtime, we introduce two isolation algorithms, one based on identity-based encryption and another based on broadcast encryption. Our simulation results show that the latter enjoys quicker recovery time and faster network convergence.
Keywords :
Internet; Markov processes; access protocols; authorisation; computer network security; cryptographic protocols; firmware; network interfaces; notebook computers; peer-to-peer computing; smart phones; wireless LAN; 2D Markov chain; DCF; DoS attack impact minimization; IEEE 802.11 distributed coordination function protocol; IEEE 802.11 wireless networks; Internet; MAC; NIC; PHY; Wi-Fi wireless networks; attacker detection; attacker isolation; authentication steps; broadcast encryption; channel hopping scheme; denial-of-service attacks; firmware; honest member stations; identity-based encryption; insider attacks; legitimate node prevention; malicious code; media access control layer; network convergence; network downtime minimization; network interface card; peer-to-peer mode; physical layer; recovery time; smartphone; successful packet transmission probability; tablet devices; trusted node; Cryptography; Detection algorithms; IEEE 802.11 Standards; OFDM; Peer-to-peer computing; Spread spectrum communication; Throughput; Broadcast encryption; Byzantine attack; DoS attack; IEEE 802.11; Markov chain; identity-based encryption;
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4799-3629-8
DOI :
10.1109/AINA.2014.58