Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

"This information can be used to help us design more effective security systems, because it tells us which – and which circumstances – are most harmful to systems," says Dr. Wenye Wang, an assistant professor of electrical and computer engineering at NC State and co-author of a paper describing the research.

Wi-Fi networks, which allow computer users to access the Internet via radio signals, are commonplace – found everywhere from offices to coffee shops. And, increasingly, Wi-Fi networks are important channels for business communication. As a result, attacks that jam Wi-Fi networks, blocking user access, are not only inconvenient but have significant economic consequences.

Wang and her team examined two generic Wi-Fi attack models. One model represented persistent attacks, where the attack continues non-stop until it can be identified and disabled. The second model represented an intermittent attack, which blocks access on a periodic basis, making it harder to identify and stop. The researchers compared how these attack strategies performed under varying conditions, such as with different numbers of users.

After assessing the performance of the models, the researchers created a metric called an "order gain" to measure the impact of the attack strategies in various scenarios. Order gain compares the probability of an attacker having access to the Wi-Fi network to the probability of a legitimate user having access to the network. For example, if an attacker has an 80 percent chance of accessing the network, and other users have the other 20 percent, the order gain would be 4 – because the attackers odds of having access are 4 to 1.

This metric is important because a Wi-Fi network can only serve once computer at a time, and normally functions by rapidly cycling through multiple requests. Attacks work by giving the attacker greater access to the network, which effectively blocks other users.

"If we want to design effective countermeasures," Wang says, "we have to target the attacks that can cause the most disruption. It's impossible to prevent every conceivable attack." So, one suggestion the researchers have is for countermeasures to focus on continuous attacks that target networks with large numbers of users – because that scenario has the largest order gain. Beyond that, security professionals can use the new approach to assess a complicated range of potential impacts that vary according to type of attack and number of users.

Explore further: Making smartphone browsing 20% faster while reducing power consumption by 40%

More information: The paper, "Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks," is forthcoming from IEEE Transactions on Mobile Computing and was co-authored by NC State Ph.D. student Zhuo Lu and Dr. Cliff Wang of the U.S. Army Research Office (ARO).

Related Stories

Verizon gives free Wi-Fi to Internet customers

Jul 27, 2009

(AP) -- Verizon is giving some of its home broadband customers free access to thousands of Wi-Fi hotspots in airports and other public places, taking a page from competitors that already offer wireless Internet access.

Beware of highway robbers on Wi-Fi

Oct 12, 2009

As the number of Wi-Fi hot spots grows, travelers might want to heed a word of caution from the Wi-Fi Alliance, a nonprofit industry group that promotes Wi-Fi technology: Think security.

Smart phones are making Wi-Fi hotspots hot again

Dec 17, 2009

Lisa Helminiak, who uses her iPhone as a computer as much as to talk, has declared her independence from the slow cell phone network. Instead of using AT&T's network, she's using her phone's Wi-Fi capability to connect to ...

Wireless vs. wireless

Jun 22, 2010

3G and Wi-Fi are the two main mobile communications technologies today, but until recently they have been complementary services, the former offering users network access through cell phone masts forming a wide-area network ...

Fundamental Shift in Embedded Wi-Fi Market

Aug 24, 2004

A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. One of the hottest technology markets, Wireless LAN (WLAN), or Wi-Fi, is undergoing a fundamental shift, according to In-Stat/MDR ...

Recommended for you

Microsoft beefs up security protection in Windows 10

45 minutes ago

What Microsoft users in business care deeply about—-a system architecture that supports efforts to get their work done efficiently; a work-centric menu to quickly access projects rather than weather readings ...

US official: Auto safety agency under review

13 hours ago

Transportation officials are reviewing the "safety culture" of the U.S. agency that oversees auto recalls, a senior Obama administration official said Friday. The National Highway Traffic Safety Administration has been criticized ...

Out-of-patience investors sell off Amazon

13 hours ago

Amazon has long acted like an ideal customer on its own website: a freewheeling big spender with no worries about balancing a checkbook. Investors confident in founder and CEO Jeff Bezos' invest-and-expand ...

Ebola.com domain sold for big payout

13 hours ago

The owners of the website Ebola.com have scored a big payday with the outbreak of the epidemic, selling the domain for more than $200,000 in cash and stock.

Hacker gets prison for cyberattack stealing $9.4M

18 hours ago

An Estonian man who pleaded guilty to orchestrating a 2008 cyberattack on a credit card processing company that enabled hackers to steal $9.4 million has been sentenced to 11 years in prison by a federal judge in Atlanta.

Magic Leap moves beyond older lines of VR

18 hours ago

Two messages from Magic Leap: Most of us know that a world with dragons and unicorns, elves and fairies is just a better world. The other message: Technology can be mindboggingly awesome. When the two ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

Skultch
not rated yet Sep 14, 2011
There are so many other ways that are sometimes tough to troubleshoot, besides normal DoS attacks: rogue access points, simple RF interference, partially cut cables, rogue DHCP server, SNMP exploitation, etc. Sheesh, in most situations, you could just start a torrent from a high bandwidth seed(s); just max the upload and horrible latency will ensue.