Abstract
We describe possible denial of service attacks to access points in infrastructure wireless networks using the 802.11b protocol. To carry out such attacks, only commodity hardware and software components are required. The experimental results obtained on a large set of different access points show that serious vulnerabilities exist in any device we tested and that a single malicious station can easily hinder any legitimate communication within a basic service set.
Similar content being viewed by others
References
ANSI/IEEE Std 802.11 1999 Edition.
M. Gast, 802.11 Wireless Networks—The Definitive Guide, O’Reilly (2002).
A.W. Arbaugh, Narendar Shankar and Y.C. Justin Wan, Your 802.11 Wireless Network Has No Clothes. Department of Computer Science, University of Maryland (March 2001).
T. Karygiannis and L. Owens, Wireless network security 802.11, Bluetooth and handheld devices. National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce.
D.L. Lough, Nathaniel J. Davis and Randy C. Marchany, Security vulnerabilities of IEEE 802.11. Apr. (2002), https://courseware.vt.edu/users/marchany/ECE5560/Papers/lough.vulnerabilities.802.11.pdf
J. Bellardo and S. Savage, 802.11 Denial-of-Service Attacks. Real vulnerabilities and practical solutions, in: Proceedings of the 12th USENIX Security Symposium, Washington, D.C. (Aug. 2003).
A. Misra, M. Shin and W. Arbaugh, An empirical analysis of the IEEE 802.11 MAC layer handoff process, Department of Computer Science, University of Maryland.
V. Gupta, S. Krishnamurthy and M. Faloutsos, Denial of service attacks at the mac layer in wireless ad hoc networks, in: Proceedings of 2002 MILCOM Conference, Anaheim, CA (Oct. 2002).
J. Wright, Detecting wireless lan mac address spoofing. (Jan. 2003). http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf
M. Schiffman, The need for an 802.11 wireless toolkit, Black Hat Briefings (July 2002).
Host AP driver for Intersil Prism2/2.5/3, http://hostap.epitest.fi/
http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml
Author information
Authors and Affiliations
Corresponding author
Additional information
Francesco Ferreri graduated in Software Engineering in 2004 at Rome University “Tor Vergata”. He then joined CASPUR (Italian Interuniversities Consortium for Supercomputing Applications) where he led research activities involving wireless networks and IPv6 integration. He’s currently employed at NaMeX, Rome’s Internet Exchange Point, as a network and systems engineer.
Leonardo Valcamonici graduated in Maths in 1994 at “La Sapienza” University in Rome. After that he joined CASPUR (Italian Interuniversities Consortium for Supercomputing Applications) where, in the beginning, he was involved in research activities in the field of parallel and distributed computing. After that he became a network and security engineer. He is now CASPUR’s Information Systems Security Officer and Network Applications and Services Team Leader.”
Massimo Bernaschi graduated in physics in 1987 at “Tor Vergata” University in Rome. After that he joined the IBM European Center for Scientific and Engineering Computing (ECSEC) in Rome. He spent ten years with IBM working in the field of parallel and distributed computing. Currently he is with the Italian National Research Council (CNR) as chief technology officer of the Institute for Computing Applications. Moreover, he is an adjunct professor of Computer Science in “La Sapienza” University in Rome.
Rights and permissions
About this article
Cite this article
Bernaschi, M., Ferreri, F. & Valcamonici, L. Access points vulnerabilities to DoS attacks in 802.11 networks. Wireless Netw 14, 159–169 (2008). https://doi.org/10.1007/s11276-006-8870-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-006-8870-6