Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


A major threat in wireless local area infrastructure network is denial-of-service (DoS) attacks. It makes the resources unavailable for its anticipated user which can be accomplished through spoofing legitimate client/AP’s medium access control (MAC) address. Less protection in MAC address led to get easy spoofing. Since the management frame is unencrypted, adversary sends the management frame to the victim using spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for DoS attack. Even though several preventing mechanisms are available, no one provides complete solution in preventing MAC layer DoS attack. This paper proposes a theoretical framework of threshold value (ThreV) algorithm, which is based on setting up ThreV for the management frame, to effectively address this issue.


Denial of service Medium access control Spoofed MAC address Threshold value algorithm Wired equivalent protocol 


  1. 1.
    A. Celik, P. Ding, in Improving the Security of Wireless LANs by Managing 802.1x Disassociation. Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC04) (2004), 53–58Google Scholar
  2. 2.
    J. Haggerty, Q. Shi, M. Merabti, Early detection and prevention of denial-of- service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10), 1994–2002 (2005)CrossRefGoogle Scholar
  3. 3.
    A.A. samra, R. Abed, Enhancement of passive MAC spoofing detection techniques. Int. J. Adv. Comput. Sci. Appl. 1(5) (2010)Google Scholar
  4. 4.
    P. Ding, A solution to avoid denial of service attacks for wireless LANs. Int. J. Netw. Secur. 4(1), 35–44 (2007)Google Scholar
  5. 5.
    Y. Sheng, K. Tan, G. Chen, D. Kotz, A. Cambell, in Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. The 27th Conference on Computer Communications IEEE (2008)Google Scholar
  6. 6.
    S. Sivagowry, A. Persia, B. Vani, L. Arockiam, in A Solution to Prevent Resource Flooding Attacks in 802.11 WLAN. Lecture Notes in Computer Science Communication in Computer and Information Science (CCIS 269) (2012), pp. 607–616Google Scholar
  7. 7.
    The ns Manual, the VINT Project (2009).
  8. 8.
    T. Saelim, P. Chumchu, C. Sriklauy, A new MAC address spoofing detection algorithm using PLCP header. IEEE ICOIN. 48–53 (2011)Google Scholar
  9. 9.
    A. Persia, S. Sivagowry, L. Arockiam, B. Vani, Inhibition of denial of service attack in WLAN using the integrated central manager. Int. J. Comput. Appl. 29(8), 28–33 (2011)Google Scholar
  10. 10.
    A. Gupta, M. Garg, DoS Attacks on IEEE 802.11 Wireless Networks and its Proposed Solutions. Soc. Sci. Res. Netw. (2010)Google Scholar
  11. 11.
    A. Persia, S. Sivagowry, M. Durairaj, Study of thwarting DoS attacks by detecting MAC spoof in WLAN infrastructure network. IEEE Xplore 264–268 (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.School of Computer Science, Engineering and ApplicationsBharathidasan UniversityTiruchirappalliIndia

Personalised recommendations