Next: Acknowledgements
Up: 802.11 Denial-of-Service Attacks: Real
Previous: Virtual carrier-sense attack
Whole Paper:Single Page Version
Conclusion
802.11-based networks have seen widespread deployment across many
fields, mainly due to the physical conveniences of radio-based
communication. This deployment, however, was predicated in part on the
user expectation of confidentiality and availability. This paper
addressed the availability aspect of that equation. We examined the
802.11 MAC layer and identified a number of vulnerabilities that could be
exploited to deny service to legitimate users. We described
software infrastructure for generating arbitrary 802.11 frames using
commodity hardware and then used this platform to implement versions
of the deauthentication and virtual carrier-sense
attacks. We found that the former attack was highly effective in
practice, while the latter is only a theoretical vulnerability due to
implementation deficiencies in commodity 802.11 gear. In addition to
demonstrating the attacks, we described and analyzed potential
countermeasures. These countermeasures represent a stopgap measure,
one that can be implemented with low overhead on existing hardware,
but not a long term substitute for appropriate per-packet
authentication mechanisms. Overall, we believe this paper helps to
underscore the care that must be taken when deploying 802.11 networks
in mission critical applications.
John Bellado
2003-05-16
In Proceedings of the USENIX Security Symposium, Aug 2003