NUST Institutional Repository

Security of 802.11i based wireless local area networks

Show simple item record

dc.contributor.author Khan, Mansoor Ahmed
dc.contributor.author Supervised by Attiq Ahmed
dc.date.accessioned 2020-10-26T04:21:02Z
dc.date.available 2020-10-26T04:21:02Z
dc.date.issued 2008-06
dc.identifier.other TIS-53
dc.identifier.other MSIS-05
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/4683
dc.description.abstract Even with ratification of 802.11i, WLANs remain vulnerable to Denial of Service (DoS) attacks due to unprotected and unauthenticated Management and Control Frames. These include Deauthentication, Disassociation, Request To Send (RTS), Clear To Send (CTS), Acknowledgement (ACK) and Power Saving Poll (PS- Poll) message attacks. Different defense techniques and protocols have been proposed to counter these threats. These either possess certain deficiencies or have implementation complexities and no solution encompassing all such attacks has yet been proposed. Moreover, a vulnerability related to Advance Encryption Standard (AES) Counter with Cipher Block Chaining Message Authentication Code Protocol (CCMP), used for Confidentiality and Integrity assurance in 802.11i, has also been recently identified. It exploits weak nonce construction mechanism of AES CCMP to calculate initial counter value, lowering effective key length from 128 bits to 85 bits. Hence, Time Memory Trade-OFF (TMTO) attack becomes a possibility. No solution has yet been proposed for AES CCMP vulnerability. The purpose of this thesis is to devise effective practical countermeasures against DoS attacks based on Management and Control Frames of 802.11 and AES CCMP related vulnerability of 802.11i. The defense mechanism designed for DoS attacks is based on authenticating said messages with a Pseudo Random Number, calculated using Pairwise Transient Key (PTK) that is inaccessable to adversaries. The countermeasure proposed for AES CCMP vulnerability involves strengthening of the nonce construction mechanism of AES CCMP by randomization. Both defense mechanisms have been implemented and tested on actual hardware using a test network. The proposed techniques successfully counter the threats, are simple to implement by a software upgrades and do not require hardware upgradation. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Security of 802.11i based wireless local area networks en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account