Skip to main content

Authentication – Based Medium Access Control to Prevent Protocol Jamming: A-MAC

  • Conference paper
Computational Science and Its Applications – ICCSA 2010 (ICCSA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6018))

Included in the following conference series:

Abstract

Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it has inherent security weaknesses due to wireless characteristics. For this reason, security-sensitive groups are still unwilling to use WLAN. There are several types of attacks to degrade the wireless network throughput using security weakness, especially Protocol Jamming Attacks are critical. These attacks consume little energy and can be easily implemented. In this paper, we introduce Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming Attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems. The proposed scheme can authenticate frames using Universal Hashing Message Authentication Codes (UMAC-32) and Hidden Sequence Number (SN). A-MAC frequently changes the key and SN using shift row and shift column processes to overcome the weakness of short 32 bits hashing codes. A-MAC can achieve integrity, authentication, and anti-replay attack security features. It can prevent Protocol Jamming Attacks that degrade wireless network throughput. Our simulation shows A-MAC can sustain throughput under Protocol Jamming Attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.kismetwireless.net

  2. Liu, C., Yu, J.: Rogue Access Point Based DoS attacks against 802.11 WLANs. In: The Fourth AICT (2008)

    Google Scholar 

  3. Gast, M.S.: 802.11 Wireless Networks: The Definitive Guide, pp. 33–66. O’Reilly Publisher, Sebastopol (2002)

    Google Scholar 

  4. Malekzadeh, M.: Empirical Analysis of Virtual Carrier Sense Flooding Attacks over Wireless Local Area Network. Journal of Computer Science (2009)

    Google Scholar 

  5. Zhou, Y., Wu, D., Nettles, S.: Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802.11 Systems. In: Workshop on BWSA, Broadnets (2004)

    Google Scholar 

  6. Karlof, C., Sastry, N., Wagner, D.: TinySec: A link Layer Security Architecture for Wireless Sensor Networks. In: SenSys (2004)

    Google Scholar 

  7. Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: USENIX Security Symposium (2003)

    Google Scholar 

  8. Krovetz, T.: RFC4418-UMAC: Message Authentication Code using Universal Hashing. In: IEEE Network Working Group (March 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeung, J., Jeong, S., Lim, J. (2010). Authentication – Based Medium Access Control to Prevent Protocol Jamming: A-MAC. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6018. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12179-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12179-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12178-4

  • Online ISBN: 978-3-642-12179-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics