Security threats to the MAC-layer in wireless networks
Choi, Jihyuk
Loading…
Permalink
https://hdl.handle.net/2142/34282
Description
Title
Security threats to the MAC-layer in wireless networks
Author(s)
Choi, Jihyuk
Issue Date
2012-09-18T21:09:27Z
Director of Research (if dissertation) or Advisor (if thesis)
Hu, Yih-Chun
Doctoral Committee Chair(s)
Hu, Yih-Chun
Committee Member(s)
Borisov, Nikita
Caesar, Matthew C.
Vaidya, Nitin H.
Department of Study
Electrical & Computer Eng
Discipline
Electrical & Computer Engr
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
Ph.D.
Degree Level
Dissertation
Keyword(s)
Medium access protocol
Wireless networks
Security
Abstract
Medium access control (MAC) protocol security is important in wireless networks due to the lack of physical access control that normally exists in wired networks in the form of connecting a cable. Most efforts in standards organizations and academic research focus on the requirements of confidentiality and authentication. These approaches to wireless MAC-layer security often ignore two other threats to security: attacks against availability and incorrect implementation of MAC protocol and driver routines. The former can prevent a user from communicating at all, whereas the latter can have consequences ranging from dropped packets to complete host compromise.
This dissertation comprehensively investigates the threats against wireless MAC protocols: being uncooperative, denial-of-service (DoS), sniffing, man-in-the-middle (MITM), and fuzzing. I provide a mathematical model to understand how network parameters impact the uncooperative carrier-sense-misbehaving attackers. Next, this dissertation shows a novel DoS attack that targets queuing behavior of access points by exploiting some factors of the IEEE 802.11 MAC protocol. Further, I propose a scheme that establishes a wireless connection that is secure against sniffing and MITM between a client device and an access point in IEEE 802.11 hotspots. Finally, I propose MAC-layer threats including fuzzing in IEEE 802.16e mobile WiMAX networks.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.