计算机科学 ›› 2013, Vol. 40 ›› Issue (Z6): 356-360.

• 信息安全 • 上一篇    下一篇

基于公平MAC协议的RTS注入攻击的防御方法

叶进,王正飞,聂东举,张向利   

  1. 广西无线宽带通信与信号处理重点实验室 桂林541004桂林电子科技大学信息与通信学院 桂林541004;广西无线宽带通信与信号处理重点实验室 桂林541004桂林电子科技大学信息与通信学院 桂林541004;广西无线宽带通信与信号处理重点实验室 桂林541004桂林电子科技大学信息与通信学院 桂林541004;广西无线宽带通信与信号处理重点实验室 桂林541004桂林电子科技大学信息与通信学院 桂林541004
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(61163060),国家科技支撑计划项目(2012BAH18F03),广西区重点基金资助

Fair MAC Protocol Based RTS Injection Attack and Defense

YE Jin,WANG Zheng-fei,NIE Dong-ju and ZHANG Xiang-li   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对WLAN环境下对AP的RTS注入攻击方式,引入虚拟队列管理机制,提出了基于公平MAC协议的解决方案。与已有的方案相比,该方案只需要在AP上部署,算法简单有效,具有良好的工程可行性。仿真结果表明,该方法能够有效抵御RTS攻击且对MAC层其它形式的DoS攻击也具有普遍意义上的防御性。

关键词: MAC协议,无线网络,RTS攻击,802.11

Abstract: This paper focused on RTS injection attacks to access point in WLAN.A solution based on fair MAC protocol was proposed,which utilizes virtual queue management.Compared with the existed schemes,our solution is of simplicity and feasibility to be deployed at AP.Simulation results show that our solution can defense against RTS attacks effectively.The proposed fair MAC protocol can also help to defense against other types of DoS attacks.

Key words: MAC protocol,Wireless network,RTS attack,802.11

[1] 曹春杰,杨红娃,王巍.针对I E E E 802.11CSMA/CA的RTS-CTS攻击[J].通信对抗,2009,4(4):32-35
[2] Gupta V,Krishnamurthy S,Faloutsos M.Denial of service attacks at the MAC layer in wireless Ad Hoc networks[A]∥MILCOME[C].2002,2:1118-1123
[3] Zhou Y,Wu D,Nettles S M.On MAC layer denial of service attacks in IEEE 802.11ad hoc networks:analysis and counter measures[J].International Journal of Wireless and Mobile Computing,2006,1(3/4):268-275
[4] Gu Q,Liu P,Chu C H.Defense against packet injection attacks in unreliable Ad Hoc networks[A]∥IEEE Global Telecommunications Conference[C].2005,3
[5] Ray S,Starobinski D.On false blocking in RTS/CTS based multihop wireless networks[J].IEEE Transactions on Vehicular Technology,2007,56(2):849-862
[6] Acharya,Thuente M D.Intelligent jamming attacks,counterattacks and(counter)2attacks in 802.11b Wireless Networks[A]∥OPNETWORK-2005 Conference[C].2005
[7] 叶进,李伶强.基于保护流的MANET网MAC层DoS攻击及防御[J].计算机科学,2011,8(4):118-121
[8] Karamad E,Ashtiani F.A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications[J].Computer Communications,2008,1:2898-2906
[9] Jian Y,Zhang M,Chen SG.Achieving MAC layer fairness in CSMA/CA networks[J].IEEE/ACM Transactions on Nnetwor-king,2011,19(5):1472-1484
[10] Xu Kai-xin,Gerla M,Bae S.How effective is the IEEE 802.11RTS/CTS handshake in Ad Hoc networks[A]∥IEEE GLOBECOM[C].2002,1:72-76
[11] Li Z F,Gupta A K,Nandi S.FMAC/CSR:a fair MAC protocol for wireless Ad-hoc networks.http:/www.ntu.edu.sg/home5/pg03802331/papers/fmaccsr%20final.pdf
[12] Heusse M,Rousseau F,Guillier R,et al.Idle sense:An optimal access method for high throughput and fairness in rate diverse wireless LANs[J].ACM SIGCOMM ,2005,35(4):121-132
[13] Grunenberger Y,Heusse M,Rousseau F,et al.Experience with an implementation of the idle sense wireless access method[A]∥ACM CoNEXT[C].2007,24
[14] Tanenbaum A S.Computer netwokrs[M].Beijing:Prentice-Hall International,Inc.,1997

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!