Abstract
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordable cost. However, the broadband nature of the wireless medium make these networks vulnerable to a number of attacks. Malicious interference at the physical layer, and extended packet collisions at the medium access layer can cause significant DoS attacks. In this work, we show how off-the-shelf hardware can be used to create devastating DoS attacks in a IEEE 802.11 network. Moreover, we present two algorithms for attack detection that are based on the cumulative sum algorithm.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bartzoudis, N., Fragkiadakis, A., Parish, D., Luis-Nunez, J., Sandford, M.: Reconfigurable computing and active networks. In: Engineering of Reconfigurable Systems and Algorithms, pp. 280–283 (2003)
Monsanto, C., Reich, J., Foster, N., Rexford, J., Walker, D.: Composing software-defined networks. In: Proc. of the NSDI, pp. 87–98 (2013)
Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defense framework against dos/ddos cyber attacks. Computers & Security 38, 39–50 (2013)
Markantonakis, K., Mayes, K., Sauveron, D., Askoxylakis, I.: Overview of security threats for smart cards in the public transport industry. In: Proc. of the ICEBE, pp. 506–513 (2008)
Sesp jammers, http://www.sesp.com
Mobile device jammer, http://www.phonejammer.com/home.php
Software-defined radios, http://www.ettus.com/home
Linux wireless drivers, ath5k, http://linuxwireless.org/en/users/Drivers/ath5k
Tragos, E., Fragkiadakis, A., Askoxylakis, I., Siris, V.: The impact of interference on the performance of a multi-path metropolitan wireless mesh network. In: Proc. of ISCC, pp. 199–204 (2011)
Angelakis, V., Papadakis, S., Siris, V., Traganitis, A.: Channel Interference in 802.11a is harmful. Testbed validation of a simple quantification model. IEEE Communications Magazine, 160–166 (2011)
Natkaniec, M., Pach, A.: An analysis of the backoff mechanism used in ieee 802.11 networks. In: Proc. of ISCC, pp. 444–449 (2000)
Fragkiadakis, A., Tragos, E., Askoxylakis, I.: Video streaming performance in wireless hostile environments. In: Proc. of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, pp. 267–272 (2011)
Berger-Sabbatel, G., Duda, A., Heusse, M., Rousseau, F.: Short-term fairness of 802.11 networks with several hosts. In: Belding-Royer, E.M., Agha, K.A., Pujolle, G. (eds.) Proc. of the IFIP. IFIP, vol. 162, pp. 263–274. Springer, Heidelberg (2004)
Jain, R.: The Art of Computer Systems Performance Analysis. John Wiley & Sons (1991)
Cardenas, A., Radosavac, S., Baras, J.: Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments. IEEE/ACM Transactions on Networking (2009)
Fragkiadakis, A., Siris, V., Traganitis, A.: Effective and robust detection of jamming attacks. In: Proc. of Future Network and Mobile Summit, pp. 1–8 (2010)
Fragkiadakis, A., Tragos, E., Askoxylakis, I.: Design and Performance Evaluation of a Lightweight Wireless Early Warning Intrusion Detection Prototype. EURASIP Journal on Wireless Communications and Networking 12, 1–18 (2012)
Fragkiadakis, A., Siris, V., Petroulakis, N., Traganitis, A.: Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 1–19 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Fragkiadakis, A., Askoxylakis, I., Chatziadam, P. (2014). Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware. In: Streitz, N., Markopoulos, P. (eds) Distributed, Ambient, and Pervasive Interactions. DAPI 2014. Lecture Notes in Computer Science, vol 8530. Springer, Cham. https://doi.org/10.1007/978-3-319-07788-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-07788-8_40
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07787-1
Online ISBN: 978-3-319-07788-8
eBook Packages: Computer ScienceComputer Science (R0)