Using covert channel to resist DoS attacks in WLAN

Huyu Qu, Qiang Cheng, Ece Yaprak

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Compared to wired line networks, wireless networks are more vulnerable to Denial of Service (DoS) attacks. This paper using IEEE 802. 11b as an example shows a new method to resist DoS attack in wireless local area network (WLAN). We design two covert channel methods in WLAN, and using these covert channels as an alternative scheme to trace the DoS attacking path. When a malicious node launch a DoS attack, the intermediate access points will embed their address information into the covert channels, and the receiver will extract the embedded address information from the WLAN covert channels. Then the attacking path from the attacker to the victim can be identified using intermediate access points 'address information, and the victim may isolate the malicious nodes after achieving this path.

Original languageEnglish
Title of host publicationProceedings of the 2005 International Conference on Wireless Networks, ICWN'05
Pages38-44
Number of pages7
StatePublished - 2005
Event2005 International Conference on Wireless Networks, ICWN'05 - Las Vegas, NV, United States
Duration: Jun 27 2005Jun 30 2005

Publication series

NameProceedings of the 2005 International Conference on Wireless Networks, ICWN'05

Conference

Conference2005 International Conference on Wireless Networks, ICWN'05
Country/TerritoryUnited States
CityLas Vegas, NV
Period6/27/056/30/05

Keywords

  • Covert channel
  • Denial of Service
  • Medium Access Control
  • Wireless Local Area Network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Using covert channel to resist DoS attacks in WLAN'. Together they form a unique fingerprint.

Cite this