Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 540))

  • 483 Accesses

Abstract

The Internet has developed exponentially over the years and has become an identity. Along with development, different kinds of networks such as LAN, WLAN, and WAN came into picture. Wireless local area network (WLAN) is the most used communication network in relatively smaller areas such as houses, schools, and offices. WLAN follows security such as WEP and encryption, but there are still vulnerabilities in the lower layer of the protocol stack. The vulnerabilities in the IEEE 802.11 have proved to be a medium for denial-of-service attack. Due to susceptibility of management frames, WLAN is vulnerable to medium access control-based (MAC) denial-of-service attacks. The results of these DOS attacks can range from man-in-the-middle attack to network congestion. By spoofing the MAC address of any legitimate user, deauthentication can be rendered to break the connection between the user and the Internet access point. There have been various amendments in the protocols to avoid the attacks on the MAC layer. But, much success hasn’t been registered till date. Various algorithms such as medium access control spoof detection and prevention (MAC SDP DoS) perform spoof detection and prevention to render MAC layer attacks affectless. This paper talks about the technique for rendering the DoS deauthentication attack and also present the analysis of the packet that is sent to attack on MAC layer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Matthew SG (2002) 802.11 wireless networks: the definitive guide. O’Reilly & Associates, 464 pages, ISBN: 0596001835

    Google Scholar 

  2. Wright W (2003) Detecting wireless LAN MAC Address spoofing. GCIH, CCNA, pp 1–5

    Google Scholar 

  3. Kristiyanto Y, Ernastuti (2020) Analysis of deauthentication attack on IEEE 802.11 connectivity based on IoT technology using external penetration test. CommIT (Communication & Information Technology) J 14(1):45–51

    Google Scholar 

  4. IEEE.org

    Google Scholar 

  5. Andrade RM, Carvalho RM, de Araujo LL, Oliveira KM, Maia ME (2017) What changes from ubiquitous computing to Internet of Things in interaction evaluation? In: International conference on distributed, ambient, and pervasive interactions. Springer, Vancouver, BC, 9–14 July 2017, pp 3–21

    Google Scholar 

  6. Martinez A, Zurutuza U, Uribeetxeberria R, Fernandez M, lizarraga J, Serna A, Velez I (2008) Beacon frame spoofing attack detection in IEEE 802.11 networks. In: the proceedings of the third international conference on Availability, Reliability and Security (ARES08), Barcelona, pp 520–522

    Google Scholar 

  7. Gopinath KN (2009) A brief tutorial on IEEE 802.11w. Retrieved from airtight networks. http://blog.airtightnetworks.com/wp-content/uploads/2009/11/802.11w-Tutorial1.pdf

  8. Milliken J, Selis V, Yap KM, Marshall A(2013) Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wireless Commun Lett 2(5):571–574

    Google Scholar 

  9. Course Technology Cengage learning (2011) Penetration testing procedures & methodologies. Nelson Education Ltd, USA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhay Aggrawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aggrawal, A., Arora, I., Giri, A. (2023). Analysis and Rendering of Deauthentication Attack Using IoT Technology. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Lecture Notes in Networks and Systems, vol 540. Springer, Singapore. https://doi.org/10.1007/978-981-19-6088-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-6088-8_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-6087-1

  • Online ISBN: 978-981-19-6088-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics