Prevention of DoS and Memory Exhaustion Attacks: Key Distribution with Confidentiality and Authentication

Paridhi Singhal, Manoj Diwakar, Mandeep Katre
2012 International Journal of Computer Applications  
Now a day's most of the organizations are moving from wireconnected LAN to wireless LAN. The popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with simplicity and convenience. But, there are many security issues which have been identified in the operation of 802.11 networks, and the 802.11i protocol has been announced to protect these types of networks. 802.11i protocol security has with a focus on an active attack and a passive attack.
more » ... se types of attacks exhaust the client's memory using a vulnerability of the key derivation procedure in 802.11i. It is vulnerable to various active and passive attacks which include de-authentication and disassociation attacks. For active and passive attacks( denial of services and memory exhaustion ) which are possible in 4-way handshake, this paper provides a secret key distribution with confidentiality and authentication and can also say that this procedure of secret key distribution is free from these active and passive attacks in comparison to original protocol and is more secure. General Terms: Security
doi:10.5120/9365-3812 fatcat:2g444qgyg5gzxaac6jdjbkihwm