scholarly journals Intrusion Detection System for Misbehaving WLAN Users

Author(s):  
سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي

Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior

Technological advancement in the design of wireless communication have propelled an active interest in the field of Wireless Networks, Wireless Sensor Networks (WSNs), and Mobile Adhoc Networks (MANETs). Now days the speed and privacy are more reason of concern than the performance. The attacks can occur and there is always a chance that it will be a success. One of the major problems with Wireless Network security is that, all types of attacks are not known, and new ones emerge constantly [6]. Moreover, there is also a range of attacks that can be launched in the different mode, and thus making it more difficult for the Intrusion Detection System (IDS) to detect them. Therefore, main approach in network security is to detect and remove malicious intrusions. In this paper three different techniques have been proposed for securing Wireless LAN, WSNs and MANETs.


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


2018 ◽  
Author(s):  
Kiramat

—Cooperative networking brings performance improvement to most of theissues in wireless networks, such as fading or delay due to slow stations. However, due tocooperation when data is relayed via other nodes, there network is more prone to attacks.Since, channel access is very important for cooperation, most of the attacks happens at MAC.One of the most critical attack is denial of service, which is reason of cooperation failure.Therefore, the cooperative network as well as simple wireless LAN must be defensive againstDOS attacks.In this article we analyzed all possible of DoS attacks that can happen at MAC layer ofWLAN. The cooperative protocols must consider defense against these attacks. This articlealso provided survey of available solutions to these attacks. At the end it described itsdamages and cost as well as how to handle these attacks while devising cooperative MAC.


Sign in / Sign up

Export Citation Format

Share Document