HW2 solution - WIRELESS NETWORK SECURITY ASSIGNMENT#2 Dt...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
WIRELESS NETWORK SECURITY ASSIGNMENT #2 Dt: Feb 26, 2010 SARANYA CHUNDI PERSON #: 3682-1064
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1. Denial of Service attacks in wireless networks In wireless networks, the denial of service attacks can be classified into two types: the attacks at the routing layer and the attacks at the MAC layer. Because of the mobility, limited bandwidth, routing functionalities, the wireless networks are vulnerable to these attacks. While the former attack disrupts the routing in the network, the latter disrupts the channel access and causes wastage of resources (bandwidth and power). These attacks cause severe degradation of network throughput and latency. Attacks at the routing layer: a) A malicious node participates in routing but drops in a certain number of packets. This flood of packets deteriorates the quality of connections and further deterioration occurs if the transport layer protocol that is used is TCP. This attack can be handled by increasing the confidence levels to nodes and by following those routes that provide the highest confidence levels. b) A malicious node transmits wrong routing packets. This causes frequent route failures which degrade the network performance. c) A malicious node could replay false updates which could again lead to frequent route failures and network performance degradation. The above two attacks can be handled by providing end-to-end authentication. d) A malicious node could reduce the Time-to-Live field in the IP header which makes the packet never reach its destination. This attack can be handled by making sure that the Time-to-Live field has the value that is greater than the hop count to the required destination. Attacks at the MAC layer: a) If a channel that is being reused is kept busy in the vicinity of a node, it results in the DoS attack at that node. b) If a node continuously relays spurious data, the battery life of the node may be drained. These attacks can be handled by providing end-to-end authentication. If a certificate of authentication from a node is not included, it might be prevented from accessing the channel. Difference between DoS and DDoS In a DoS attack, one computer and one internet connection is used to flood the server with packets. The goal is to overload the server’s bandwidth and other resources. This makes the server inaccessible to others. The DoS attack may result in either the victim machine slowing down or crashing all together. The Distributed Denial of Service attack utilizes many computers and many connections. The computers are often distributed around the world and are part of the “botnet”. The victim is
Image of page 2
overloaded by thousands of requests. The DDoS is a DoS attack organized to occur simultaneously from a large number of computers. References: www.crime-research.org , www.parameg.net , www.wikipedia.com 2. Shared key authentication in WEP Shared key authentication assumes that each station has receives a secret key through a secure channel independent form 802.11 network. The two stations authenticate using this shared secret key. Using the shared key authentication requires Wired Equivalent Privacy (WEP). WEP
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern