Abstract
Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it has inherent security weaknesses due to wireless characteristics. For this reason, security-sensitive groups are still unwilling to use WLAN. There are several types of attacks to degrade the wireless network throughput using security weakness, especially Protocol Jamming Attacks are critical. These attacks consume little energy and can be easily implemented. In this paper, we introduce Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming Attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems. The proposed scheme can authenticate frames using Universal Hashing Message Authentication Codes (UMAC-32) and Hidden Sequence Number (SN). A-MAC frequently changes the key and SN using shift row and shift column processes to overcome the weakness of short 32 bits hashing codes. A-MAC can achieve integrity, authentication, and anti-replay attack security features. It can prevent Protocol Jamming Attacks that degrade wireless network throughput. Our simulation shows A-MAC can sustain throughput under Protocol Jamming Attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Liu, C., Yu, J.: Rogue Access Point Based DoS attacks against 802.11 WLANs. In: The Fourth AICT (2008)
Gast, M.S.: 802.11 Wireless Networks: The Definitive Guide, pp. 33–66. O’Reilly Publisher, Sebastopol (2002)
Malekzadeh, M.: Empirical Analysis of Virtual Carrier Sense Flooding Attacks over Wireless Local Area Network. Journal of Computer Science (2009)
Zhou, Y., Wu, D., Nettles, S.: Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802.11 Systems. In: Workshop on BWSA, Broadnets (2004)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link Layer Security Architecture for Wireless Sensor Networks. In: SenSys (2004)
Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: USENIX Security Symposium (2003)
Krovetz, T.: RFC4418-UMAC: Message Authentication Code using Universal Hashing. In: IEEE Network Working Group (March 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeung, J., Jeong, S., Lim, J. (2010). Authentication – Based Medium Access Control to Prevent Protocol Jamming: A-MAC. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6018. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12179-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-12179-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12178-4
Online ISBN: 978-3-642-12179-1
eBook Packages: Computer ScienceComputer Science (R0)