Using power hopping to counter MAC spoof attacks in WLAN

Vijayakrishnan Nagarajan, Vetri Arasan, Dijiang Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

IEEE 802.11-based Wireless LANs (WLANs) are deployed in public places, universities, offices and shops. The main reason for the popularity is convenience of internetworking without wires. The increase in WLANs also resulted in increase of security threats. One of these threats is spoofing MAC address. Some WLANs use MAC filtering to allow stations with registered MAC addresses to use the network. The attacker has many tools like AirJack, WireShark to capture the packets in WLAN and find authorized MAC address. The attacker masquerades as an authorized station and can launch denial of service attack. This paper presents a power hopping technique which can be used by Access Points (AP) to discern the authorized packets from the masquerading packets and thus deny the attacker from using the system.

Original languageEnglish (US)
Title of host publication2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010
DOIs
StatePublished - Apr 29 2010
Event2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010 - Las Vegas, NV, United States
Duration: Jan 9 2010Jan 12 2010

Publication series

Name2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010

Other

Other2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010
CountryUnited States
CityLas Vegas, NV
Period1/9/101/12/10

Keywords

  • MAC spoofing
  • Power hopping
  • Wireless LAN

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Using power hopping to counter MAC spoof attacks in WLAN'. Together they form a unique fingerprint.

Cite this