CFP last date
20 December 2024
Reseach Article

Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake

by Paridhi Singhal, Manoj Diwakar, Mandeep Katre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 3
Year of Publication: 2013
Authors: Paridhi Singhal, Manoj Diwakar, Mandeep Katre
10.5120/9911-4507

Paridhi Singhal, Manoj Diwakar, Mandeep Katre . Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake. International Journal of Computer Applications. 61, 3 ( January 2013), 31-35. DOI=10.5120/9911-4507

@article{ 10.5120/9911-4507,
author = { Paridhi Singhal, Manoj Diwakar, Mandeep Katre },
title = { Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 3 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number3/9911-4507/ },
doi = { 10.5120/9911-4507 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:10:26.122388+05:30
%A Paridhi Singhal
%A Manoj Diwakar
%A Mandeep Katre
%T Prevention of DoS and Memory Attacks: Enhanced 3-Way Handshake
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 3
%P 31-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world most organizations are moving from wire-connected LAN to wireless LAN. The phenomenal popularity of the 802. 11 network standards stems from the fact that they provide for wireless connections with ease and convenience. Recently, security holes have been identified in the operation of 802. 11 networks, and the 802. 11i protocol has been announced to protect such networks. However, there are still security issues that prevent the 802. 11 network from becoming the best choice protocol for wireless LANs. We reviewed 802. 11i security with a focus on a denial of service attack. This attack exhausts the client's memory using a vulnerability of the key derivation procedure in 802. 11i. It is vulnerable to various Denial of Service attacks (DoS) which includes de-authentication and disassociation attacks including memory exhaustion attacks. For Dos and memory exhaustion attacks which are possible in 4-way handshake ,this paper provides an enhanced 3-way Handshake algorithm which is free from these attacks in comparison to original protocol and is more secure.

References
  1. IEEE Standard 802. 11-1999. Information technology – Telecommunications and information exchange between Systems – Local and metropolitan area networks – Specific Requirements – Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications. 1999. IEEE Standard 802. 11b-1999. Higher-Speed Physical Layer Extension in the 2. 4 GHz Band, Supplement to IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan ar
  2. Guide to Internet Security
  3. What's New in Security: WPA (Wi-Fi Protected Access).
  4. Seung-Jo HanHeang-Soo Oh JonganPark Dept. of Electron. Eng. , Chosun Univ. " The improved data encryption standard (DES) algorithm. , Spread Spectrum Techniques and Applications Proceedings, 1996.
  5. A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802. 1X standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, Md, USA, February 2002
  6. Xiaodong Zha ; Maode Ma ," Security improvements of IEEE 802. 11i 4-way handshake scheme",IEEE International Conference on Communication Systems(ICCS) 2010.
  7. Xinyu Xing; Shakshuki, E. ; Benoit, D. ; Sheltami, T. ; "Security Analysis and Authentication Improvementfor IEE802. 11i Specification",Global Telecommunications Conference, 2008.
  8. http://wwwvs. informatik. uniulm. de/de/intra/bib/2008/ICC/DATA/S04S07P05. PDF
  9. http://www. massey. ac. nz/~dpparson/004. pdf
  10. C. He and J. C. Mitchell, "Analysis of the 802. 11i 4-Way Handshake," in Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 43 - 50.
  11. V. Moen, H. Raddum, and K. J. Hole, "Weaknesses in the temporal key hash of WPA," ACMSIGMOBILEMobile Computing and Communications Review, vol. 8, no. 2, pp. 76–83, 2004
  12. F. D. Rango, D. C. Lentini, and S. Marano, "Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected
  13. D. B. Faria and D. R. Cheriton, "DoS and authentication in wireless public access networks," in Proceedings of the ACM Workshop on Wireless Security (WiSe '02), pp. 47–56, Atlanta, Ga, USA, September 2002.
Index Terms

Computer Science
Information Sciences

Keywords

3-way handshake 4-Way Handshake De-authentication DoS Attacks memory exhaustion attack IEEE802. 11 IEEE802. 11i