Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks
Author(s) -
Rupinder Kaur Cheema,
Divya Bansal,
Sanjeev Sofat
Publication year - 2011
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/2901-3801
Subject(s) - computer science , wireless mesh network , computer security , computer network , wireless , wireless network , telecommunications
M esh Networks have emerged as a widely deployed, new paradigm with improved performance and reliability. M esh Networks offer ubiquitous network connectivity along with better flexibility and adaptability features. Despite of these benefits, Wireless M esh Networks are vulnerable to attacks due to the absence of trusted central authority and the unprotected nature of the management frames. This security breach leads to the spoofing of legitimate client's information. Thus facilitating the launch of dos attacks on the behalf of the legitimate identity holders .The influence of DOS attacks is highly intense, because complete network resources have been consumed by the attacker after launch of the attack. Consequently, it leads to deterioration of network performance thus halting the communication. Therefore, security is a major concern that needs to be dealt with to alleviate the effect of these attacks . So that the deterioration and disruption caused by these attacks to the network performance has been thwarted. In this paper we have implemented the dos attacks on the real wireless mesh test bed and analyzed their impact on the network performance and proposed a security algorithm for the detection of these attacks.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom