Title: On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures

Authors: Yihong Zhou, Dapeng Wu, Scott M. Nettles

Addresses: Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX 78712, USA. ' Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611-6130, USA. ' Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX 78712, USA

Abstract: Network survivability is fundamental to information security. Adversaries could compromise network functionality by attacking the physical layer, the Medium Access Control (MAC) layer or the network layer. Even though security mechanisms for the network layer have been extensively discussed, MAC layer security has not been deeply explored. Leveraging security flaws in the IEEE 802.11 MAC protocol and the salient features of a Mobile Ad Hoc Network (MANET), even an average person with limited knowledge of wireless networks can launch MAC-layer Denial of Service (DOS) attacks. In this paper, we study two types of MAC layer DOS attacks that can be easily employed by an average person: attacks launched from a single adversary by injecting enormous data flows into the network and attacks launched from two colluding adversaries by sending enormous data flows directly to each other. To counter the first attacks, we propose a packet-by-packet authentication scheme so that legitimate nodes can reject data transmission requests from unauthenticated adversaries. To mitigate the second attacks, we propose several counter measures such as a fair MAC protocol, using protecting traffic flows and distance adjustment. The contribution of this paper is that it reveals the attacks that could be launched by an average person, which is a potential threat to MANETs.

Keywords: mobile networks; ad hoc networks; MANET; network security; denial of service; DOS attack; IEEE 802.11 MAC protocol; wireless networks; medium access control; MAC layer; data flows; counter measures.

DOI: 10.1504/IJWMC.2006.012561

International Journal of Wireless and Mobile Computing, 2006 Vol.1 No.3/4, pp.268 - 275

Published online: 22 Feb 2007 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article