Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks

  • Cheema R
  • Bansal D
  • Sofat S
N/ACitations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

Wireless M esh Networks have emerged as a widely deployed, new paradigm with improved performance and reliability. M esh Networks offer ubiquitous network connectivity along with better flexibility and adaptability features. Despite of these benefits, Wireless M esh Networks are vulnerable to attacks due to the absence of trusted central authority and the unprotected nature of the management frames. This security breach leads to the spoofing of legitimate client's information. Thus facilitating the launch of dos attacks on the behalf of the legitimate identity holders .The influence of DOS attacks is highly intense, because complete network resources have been consumed by the attacker after launch of the attack. Consequently, it leads to deterioration of network performance thus halting the communication. Therefore, security is a major concern that needs to be dealt with to alleviate the effect of these attacks. So that the deterioration and disruption caused by these attacks to the network performance has been thwarted. In this paper we have implemented the dos attacks on the real wireless mesh test bed and analyzed their impact on the network performance and proposed a security algorithm for the detection of these attacks.

Cite

CITATION STYLE

APA

Cheema, R., Bansal, D., & Sofat, S. (2011). Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks. International Journal of Computer Applications, 23(7), 7–15. https://doi.org/10.5120/2901-3801

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free