Skip to main content
Log in

Protecting Satellite Systems from Disassociation DoS Attacks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the help of satellites, the entire surface of the world can be covered, which provides the high speedy communications all over the world. Consequently, security is becoming an important concern in the satellite multicast communications. However, due to the inherent dynamic broadcast nature of the communication medium, this multicast system is easily susceptible to interferences and interceptions. In addition, the satellite system generally has a large number of terminal members with the high frequent join-leave characteristic. Therefore, the satellite systems face significant security challenges. The denial of service (DoS) is one of the most harmful attacks to the satellite systems and also terrestrial fixed or mobile networks. It can maliciously prevent legitimate users from accessing the service. It is especially true for the disassociation DoS attacks where an attacker sends bogus disassociation requests to disable the communication between the server and their legitimate clients. In this paper, the main focus of our work is to detect and defend against the disassociation DoS attacks on the satellite system. We also provide preliminary modeling verifications and simulation results regarding the efficiency and practicability of this new approach. Further analysis of the proposed method is also appended to demonstrate its feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Richharia M., Westbrook L. D. (2010) Satellite systems for personal applications: Concepts and technology (1st ed.). Wiley, London

    Book  Google Scholar 

  2. Beaumont, J.-F., & Doucet, G., (2007). Threats and vulnerabilities of next generation satellite personal communications systems: A defense perspective. In Globecom workshops, 2007 IEEE (pp. 1–5). doi:10.1109/GLOCOMW.2007.4437787.

  3. Micha, S., Michael, G., Car, A. G., Sanjeev, K., & Santosh, S. V. (2005). Mitigating DoS attack through selective bin verification. In Secure network protocols, 1st IEEE ICNP workshop, 2005 (pp. 7–12).

  4. Zhou, B., Marshall, A., Zhou, W., & Yang, K. (2008). A random packet destruction DoS attack for wireless networks. In Communications ICC’08 IEEE international conference (pp. 1658–1662).

  5. Wang, L., & Srinivasan, B. (2010). Analysis and improvements over DoS attacks against IEEE 802.11i standard, networks security wireless communications and trusted computing. In 2010 second international conference (pp. 109–113).

  6. Kiuchi, T., Hori, Y., Hori, K., & Sakurai, K. (2010). A design of history based traffic filtering with probabilistic packet marking against DoS Attacks. In 2010 10th annual international symposium on applications and the internet (pp. 261–264).

  7. Sirikarn, P., Vasaka, V., & Panita, P. (2007) Lightweight detection of DoS attacks. In Networks, ICON 2007 15th IEEE international conference (pp. 77–82).

  8. Chiang J. T., Hu Y.-C. (2012) Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transaction on Networking 19(1): 286–298

    Article  Google Scholar 

  9. Henderson, T. (1999) Networking over next-generation satellite systems. Ph.D. thesis, University of California at Berkeley.

  10. Taleb, T., Kato N., & Nemoto, Y. (2004) A round-trip time-based prevention technique to secure LEO satellite networks from denial-of-service attacks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-Fall, September 26–29, 2004 (Vol. 6, pp. 4012–4016).

  11. Onen, M., & Molva, R. (2004). Denial of service prevention in satellite network. In 2004 IEEE international conference on communications, June 20–24, 2004 (Vol. 7, pp. 4387–4391)

  12. European Standard: ENSI EN 301 790 V1.5.1. (2009-05). Digital video broadcasting; interaction channel for satellite distribution systems (pp. 135–151).

  13. Aslam, B., Islam, M. H., & Khan, S. A. (2006). Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In Proceedings of the first mobile computing and wireless communication international conference. MCWC2006 (pp. 215–220). DOI:10.1109/MCWC.2006.4375224.

  14. SpoofMAC. www.klcconsulting.net/smac/.

  15. MAC Changer. www.alobbs.com/macchanger/.

  16. Airsnarf. www.airsnarf.shmoo.com.

  17. Buchmann, J., & Kaiser, M. (2007). Computer proven correctness of the rabin public-key scheme (Vol. 27). World Academy of Science, Engineering and Technology.

  18. Ratzer, A., Wells, L., Lassen, H., Laursen, M., Qvortrup, J., Stissing, M., et al. (2003). CPN tools for editing, simulating, and analyzing coloured petri nets, applications and theory of petri nets (pp. 450–462).

  19. CPN Tools. Homepage: http://wiki.daimi.au.dk/cptools/cpntools.wiki.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maode Ma.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ma, T., Lee, Y.H. & Ma, M. Protecting Satellite Systems from Disassociation DoS Attacks. Wireless Pers Commun 69, 623–638 (2013). https://doi.org/10.1007/s11277-012-0593-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0593-7

Keywords

Navigation