Research Article
Detection of Fabricated CTS Packet Attacks in Wireless LANs
@INPROCEEDINGS{10.1007/978-3-642-29222-4_8, author={Xiaocheng Zou and Jing Deng}, title={Detection of Fabricated CTS Packet Attacks in Wireless LANs}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers}, proceedings_a={QSHINE}, year={2012}, month={10}, keywords={WLAN Fabricated Control Message CTS NAV Detection}, doi={10.1007/978-3-642-29222-4_8} }
- Xiaocheng Zou
Jing Deng
Year: 2012
Detection of Fabricated CTS Packet Attacks in Wireless LANs
QSHINE
Springer
DOI: 10.1007/978-3-642-29222-4_8
Abstract
IEEE 802.11 standard employs the RTS/CTS handshake procedure to avoid transmission collision and to improve network throughput. However, such an exchange may become a system vulnerability when malicious nodes send fabricated control messages such as CTS to make false claims of channel reservation. To the best of our knowledge, there exists no systematic detection technique for such fabricated control messages. In this paper, we investigate the adverse effects of such attacks on channel throughput and delivery ratio. In order to mitigate these effects, we propose an approach to detect the fabricated messages. With the help of two-hop neighborhood information, our technique enables jamming detection and allows the targeted node to send a message, which instructs neighboring nodes to ignore the fabricated control message. We perform ns-2 simulations to evaluate the benefit of our scheme.