Quality, Reliability, Security and Robustness in Heterogeneous Networks. 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers

Research Article

Detection of Fabricated CTS Packet Attacks in Wireless LANs

Download
382 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29222-4_8,
        author={Xiaocheng Zou and Jing Deng},
        title={Detection of Fabricated CTS Packet Attacks in Wireless LANs},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2012},
        month={10},
        keywords={WLAN Fabricated Control Message CTS NAV Detection},
        doi={10.1007/978-3-642-29222-4_8}
    }
    
  • Xiaocheng Zou
    Jing Deng
    Year: 2012
    Detection of Fabricated CTS Packet Attacks in Wireless LANs
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-29222-4_8
Xiaocheng Zou1,*, Jing Deng1,*
  • 1: University of North Carolina
*Contact email: x_zou@uncg.edu, jing.deng@uncg.edu

Abstract

IEEE 802.11 standard employs the RTS/CTS handshake procedure to avoid transmission collision and to improve network throughput. However, such an exchange may become a system vulnerability when malicious nodes send fabricated control messages such as CTS to make false claims of channel reservation. To the best of our knowledge, there exists no systematic detection technique for such fabricated control messages. In this paper, we investigate the adverse effects of such attacks on channel throughput and delivery ratio. In order to mitigate these effects, we propose an approach to detect the fabricated messages. With the help of two-hop neighborhood information, our technique enables jamming detection and allows the targeted node to send a message, which instructs neighboring nodes to ignore the fabricated control message. We perform ns-2 simulations to evaluate the benefit of our scheme.