Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

"This information can be used to help us design more effective security systems, because it tells us which – and which circumstances – are most harmful to systems," says Dr. Wenye Wang, an assistant professor of electrical and computer engineering at NC State and co-author of a paper describing the research.

Wi-Fi networks, which allow computer users to access the Internet via radio signals, are commonplace – found everywhere from offices to coffee shops. And, increasingly, Wi-Fi networks are important channels for business communication. As a result, attacks that jam Wi-Fi networks, blocking user access, are not only inconvenient but have significant economic consequences.

Wang and her team examined two generic Wi-Fi attack models. One model represented persistent attacks, where the attack continues non-stop until it can be identified and disabled. The second model represented an intermittent attack, which blocks access on a periodic basis, making it harder to identify and stop. The researchers compared how these attack strategies performed under varying conditions, such as with different numbers of users.

After assessing the performance of the models, the researchers created a metric called an "order gain" to measure the impact of the attack strategies in various scenarios. Order gain compares the probability of an attacker having access to the Wi-Fi network to the probability of a legitimate user having access to the network. For example, if an attacker has an 80 percent chance of accessing the network, and other users have the other 20 percent, the order gain would be 4 – because the attackers odds of having access are 4 to 1.

This metric is important because a Wi-Fi network can only serve once computer at a time, and normally functions by rapidly cycling through multiple requests. Attacks work by giving the attacker greater access to the network, which effectively blocks other users.

"If we want to design effective countermeasures," Wang says, "we have to target the attacks that can cause the most disruption. It's impossible to prevent every conceivable attack." So, one suggestion the researchers have is for countermeasures to focus on continuous attacks that target networks with large numbers of users – because that scenario has the largest order gain. Beyond that, security professionals can use the new approach to assess a complicated range of potential impacts that vary according to type of attack and number of users.

Explore further: Japan says electronics OK during take-off and landing

More information: The paper, "Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks," is forthcoming from IEEE Transactions on Mobile Computing and was co-authored by NC State Ph.D. student Zhuo Lu and Dr. Cliff Wang of the U.S. Army Research Office (ARO).

Related Stories

Verizon gives free Wi-Fi to Internet customers

Jul 27, 2009

(AP) -- Verizon is giving some of its home broadband customers free access to thousands of Wi-Fi hotspots in airports and other public places, taking a page from competitors that already offer wireless Internet access.

Beware of highway robbers on Wi-Fi

Oct 12, 2009

As the number of Wi-Fi hot spots grows, travelers might want to heed a word of caution from the Wi-Fi Alliance, a nonprofit industry group that promotes Wi-Fi technology: Think security.

Smart phones are making Wi-Fi hotspots hot again

Dec 17, 2009

Lisa Helminiak, who uses her iPhone as a computer as much as to talk, has declared her independence from the slow cell phone network. Instead of using AT&T's network, she's using her phone's Wi-Fi capability to connect to ...

Wireless vs. wireless

Jun 22, 2010

3G and Wi-Fi are the two main mobile communications technologies today, but until recently they have been complementary services, the former offering users network access through cell phone masts forming a wide-area network ...

Fundamental Shift in Embedded Wi-Fi Market

Aug 24, 2004

A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. One of the hottest technology markets, Wireless LAN (WLAN), or Wi-Fi, is undergoing a fundamental shift, according to In-Stat/MDR ...

Recommended for you

Jumping into streaming TV

18 hours ago

More TV viewers are picking up so-called streaming media boxes in the hope of fulfilling a simple wish: Let me watch what I want when I want.

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

Skultch
not rated yet Sep 14, 2011
There are so many other ways that are sometimes tough to troubleshoot, besides normal DoS attacks: rogue access points, simple RF interference, partially cut cables, rogue DHCP server, SNMP exploitation, etc. Sheesh, in most situations, you could just start a torrent from a high bandwidth seed(s); just max the upload and horrible latency will ensue.