Research Article

Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake

by  Paridhi Singhal, Manoj Diwakar, Mandeep Katre
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Issue 3
Published: January 2013
Authors: Paridhi Singhal, Manoj Diwakar, Mandeep Katre
10.5120/9911-4507
PDF

Paridhi Singhal, Manoj Diwakar, Mandeep Katre . Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake. International Journal of Computer Applications. 61, 3 (January 2013), 31-35. DOI=10.5120/9911-4507

                        @article{ 10.5120/9911-4507,
                        author  = { Paridhi Singhal,Manoj Diwakar,Mandeep Katre },
                        title   = { Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 61 },
                        number  = { 3 },
                        pages   = { 31-35 },
                        doi     = { 10.5120/9911-4507 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Paridhi Singhal
                        %A Manoj Diwakar
                        %A Mandeep Katre
                        %T Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake%T 
                        %J International Journal of Computer Applications
                        %V 61
                        %N 3
                        %P 31-35
                        %R 10.5120/9911-4507
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world most organizations are moving from wire-connected LAN to wireless LAN. The phenomenal popularity of the 802. 11 network standards stems from the fact that they provide for wireless connections with ease and convenience. Recently, security holes have been identified in the operation of 802. 11 networks, and the 802. 11i protocol has been announced to protect such networks. However, there are still security issues that prevent the 802. 11 network from becoming the best choice protocol for wireless LANs. We reviewed 802. 11i security with a focus on a denial of service attack. This attack exhausts the client's memory using a vulnerability of the key derivation procedure in 802. 11i. It is vulnerable to various Denial of Service attacks (DoS) which includes de-authentication and disassociation attacks including memory exhaustion attacks. For Dos and memory exhaustion attacks which are possible in 4-way handshake ,this paper provides an enhanced 3-way Handshake algorithm which is free from these attacks in comparison to original protocol and is more secure.

References
  • IEEE Standard 802. 11-1999. Information technology – Telecommunications and information exchange between Systems – Local and metropolitan area networks – Specific Requirements – Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications. 1999. IEEE Standard 802. 11b-1999. Higher-Speed Physical Layer Extension in the 2. 4 GHz Band, Supplement to IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan ar
  • Guide to Internet Security
  • What's New in Security: WPA (Wi-Fi Protected Access).
  • Seung-Jo HanHeang-Soo Oh JonganPark Dept. of Electron. Eng. , Chosun Univ. " The improved data encryption standard (DES) algorithm. , Spread Spectrum Techniques and Applications Proceedings, 1996.
  • A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802. 1X standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, Md, USA, February 2002
  • Xiaodong Zha ; Maode Ma ," Security improvements of IEEE 802. 11i 4-way handshake scheme",IEEE International Conference on Communication Systems(ICCS) 2010.
  • Xinyu Xing; Shakshuki, E. ; Benoit, D. ; Sheltami, T. ; "Security Analysis and Authentication Improvementfor IEE802. 11i Specification",Global Telecommunications Conference, 2008.
  • http://wwwvs. informatik. uniulm. de/de/intra/bib/2008/ICC/DATA/S04S07P05. PDF
  • http://www. massey. ac. nz/~dpparson/004. pdf
  • C. He and J. C. Mitchell, "Analysis of the 802. 11i 4-Way Handshake," in Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 43 - 50.
  • V. Moen, H. Raddum, and K. J. Hole, "Weaknesses in the temporal key hash of WPA," ACMSIGMOBILEMobile Computing and Communications Review, vol. 8, no. 2, pp. 76–83, 2004
  • F. D. Rango, D. C. Lentini, and S. Marano, "Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected
  • D. B. Faria and D. R. Cheriton, "DoS and authentication in wireless public access networks," in Proceedings of the ACM Workshop on Wireless Security (WiSe '02), pp. 47–56, Atlanta, Ga, USA, September 2002.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

3-way handshake 4-Way Handshake De-authentication DoS Attacks memory exhaustion attack IEEE802. 11 IEEE802. 11i

Powered by PhDFocusTM