International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 58 - Number 16 |
Year of Publication: 2012 |
Authors: Paridhi Singhal, Manoj Diwakar, Mandeep Katre |
10.5120/9365-3812 |
Paridhi Singhal, Manoj Diwakar, Mandeep Katre . Prevention of DoS and Memory Exhaustion Attacks: Key Distribution with Confidentiality and Authentication. International Journal of Computer Applications. 58, 16 ( November 2012), 16-20. DOI=10.5120/9365-3812
Now a day’s most of the organizations are moving from wire-connected LAN to wireless LAN. The popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with simplicity and convenience. But, there are many security issues which have been identified in the operation of 802.11 networks, and the 802.11i protocol has been announced to protect these types of networks. 802.11i protocol security has with a focus on an active attack and a passive attack. These types of attacks exhaust the client’s memory using a vulnerability of the key derivation procedure in 802.11i. It is vulnerable to various active and passive attacks which include de-authentication and disassociation attacks. For active and passive attacks( denial of services and memory exhaustion ) which are possible in 4-way handshake, this paper provides a secret key distribution with confidentiality and authentication and can also say that this procedure of secret key distribution is free from these active and passive attacks in comparison to original protocol and is more secure.