Abstract
The Internet has developed exponentially over the years and has become an identity. Along with development, different kinds of networks such as LAN, WLAN, and WAN came into picture. Wireless local area network (WLAN) is the most used communication network in relatively smaller areas such as houses, schools, and offices. WLAN follows security such as WEP and encryption, but there are still vulnerabilities in the lower layer of the protocol stack. The vulnerabilities in the IEEE 802.11 have proved to be a medium for denial-of-service attack. Due to susceptibility of management frames, WLAN is vulnerable to medium access control-based (MAC) denial-of-service attacks. The results of these DOS attacks can range from man-in-the-middle attack to network congestion. By spoofing the MAC address of any legitimate user, deauthentication can be rendered to break the connection between the user and the Internet access point. There have been various amendments in the protocols to avoid the attacks on the MAC layer. But, much success hasn’t been registered till date. Various algorithms such as medium access control spoof detection and prevention (MAC SDP DoS) perform spoof detection and prevention to render MAC layer attacks affectless. This paper talks about the technique for rendering the DoS deauthentication attack and also present the analysis of the packet that is sent to attack on MAC layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Matthew SG (2002) 802.11 wireless networks: the definitive guide. O’Reilly & Associates, 464 pages, ISBN: 0596001835
Wright W (2003) Detecting wireless LAN MAC Address spoofing. GCIH, CCNA, pp 1–5
Kristiyanto Y, Ernastuti (2020) Analysis of deauthentication attack on IEEE 802.11 connectivity based on IoT technology using external penetration test. CommIT (Communication & Information Technology) J 14(1):45–51
IEEE.org
Andrade RM, Carvalho RM, de Araujo LL, Oliveira KM, Maia ME (2017) What changes from ubiquitous computing to Internet of Things in interaction evaluation? In: International conference on distributed, ambient, and pervasive interactions. Springer, Vancouver, BC, 9–14 July 2017, pp 3–21
Martinez A, Zurutuza U, Uribeetxeberria R, Fernandez M, lizarraga J, Serna A, Velez I (2008) Beacon frame spoofing attack detection in IEEE 802.11 networks. In: the proceedings of the third international conference on Availability, Reliability and Security (ARES08), Barcelona, pp 520–522
Gopinath KN (2009) A brief tutorial on IEEE 802.11w. Retrieved from airtight networks. http://blog.airtightnetworks.com/wp-content/uploads/2009/11/802.11w-Tutorial1.pdf
Milliken J, Selis V, Yap KM, Marshall A(2013) Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wireless Commun Lett 2(5):571–574
Course Technology Cengage learning (2011) Penetration testing procedures & methodologies. Nelson Education Ltd, USA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aggrawal, A., Arora, I., Giri, A. (2023). Analysis and Rendering of Deauthentication Attack Using IoT Technology. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Lecture Notes in Networks and Systems, vol 540. Springer, Singapore. https://doi.org/10.1007/978-981-19-6088-8_5
Download citation
DOI: https://doi.org/10.1007/978-981-19-6088-8_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-6087-1
Online ISBN: 978-981-19-6088-8
eBook Packages: EngineeringEngineering (R0)