Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

"This information can be used to help us design more effective security systems, because it tells us which – and which circumstances – are most harmful to systems," says Dr. Wenye Wang, an assistant professor of electrical and computer engineering at NC State and co-author of a paper describing the research.

Wi-Fi networks, which allow computer users to access the Internet via radio signals, are commonplace – found everywhere from offices to coffee shops. And, increasingly, Wi-Fi networks are important channels for business communication. As a result, attacks that jam Wi-Fi networks, blocking user access, are not only inconvenient but have significant economic consequences.

Wang and her team examined two generic Wi-Fi attack models. One model represented persistent attacks, where the attack continues non-stop until it can be identified and disabled. The second model represented an intermittent attack, which blocks access on a periodic basis, making it harder to identify and stop. The researchers compared how these attack strategies performed under varying conditions, such as with different numbers of users.

After assessing the performance of the models, the researchers created a metric called an "order gain" to measure the impact of the attack strategies in various scenarios. Order gain compares the probability of an attacker having access to the Wi-Fi network to the probability of a legitimate user having access to the network. For example, if an attacker has an 80 percent chance of accessing the network, and other users have the other 20 percent, the order gain would be 4 – because the attackers odds of having access are 4 to 1.

This metric is important because a Wi-Fi network can only serve once computer at a time, and normally functions by rapidly cycling through multiple requests. Attacks work by giving the attacker greater access to the network, which effectively blocks other users.

"If we want to design effective countermeasures," Wang says, "we have to target the attacks that can cause the most disruption. It's impossible to prevent every conceivable attack." So, one suggestion the researchers have is for countermeasures to focus on continuous attacks that target networks with large numbers of users – because that scenario has the largest order gain. Beyond that, security professionals can use the new approach to assess a complicated range of potential impacts that vary according to type of attack and number of users.

Explore further: Creating the fastest outdoor wireless Internet connection in the world

More information: The paper, "Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks," is forthcoming from IEEE Transactions on Mobile Computing and was co-authored by NC State Ph.D. student Zhuo Lu and Dr. Cliff Wang of the U.S. Army Research Office (ARO).

Related Stories

Verizon gives free Wi-Fi to Internet customers

Jul 27, 2009

(AP) -- Verizon is giving some of its home broadband customers free access to thousands of Wi-Fi hotspots in airports and other public places, taking a page from competitors that already offer wireless Internet access.

Beware of highway robbers on Wi-Fi

Oct 12, 2009

As the number of Wi-Fi hot spots grows, travelers might want to heed a word of caution from the Wi-Fi Alliance, a nonprofit industry group that promotes Wi-Fi technology: Think security.

Smart phones are making Wi-Fi hotspots hot again

Dec 17, 2009

Lisa Helminiak, who uses her iPhone as a computer as much as to talk, has declared her independence from the slow cell phone network. Instead of using AT&T's network, she's using her phone's Wi-Fi capability to connect to ...

Wireless vs. wireless

Jun 22, 2010

3G and Wi-Fi are the two main mobile communications technologies today, but until recently they have been complementary services, the former offering users network access through cell phone masts forming a wide-area network ...

Fundamental Shift in Embedded Wi-Fi Market

Aug 24, 2004

A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. One of the hottest technology markets, Wireless LAN (WLAN), or Wi-Fi, is undergoing a fundamental shift, according to In-Stat/MDR ...

Recommended for you

Why the Sony hack isn't big news in Japan

6 hours ago

Japan's biggest newspaper, Yomiuri Shimbun, featured a story about Sony Corp. on its website Friday. It wasn't about hacking. It was about the company's struggling tablet business.

Off-world manufacturing is a go with space printer

10 hours ago

On Friday, the BBC reported on a NASA email exchange with a space station which involved astronauts on the International Space Station using their 3-D printer to make a wrench from instructions sent up in ...

Cadillac CT6 will get streaming video mirror

11 hours ago

Cadillac said Thursday it will add high resolution streaming video to the function of a rearview mirror, so that the driver's vision and safety can be enhanced. The technology will debut on the 2016 Cadillac ...

Sony faces 4th ex-employee lawsuit over hack

11 hours ago

A former director of technology for Sony Pictures Entertainment has sued the company over the data breach that resulted in the online posting of his private financial and personal information.

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

Skultch
not rated yet Sep 14, 2011
There are so many other ways that are sometimes tough to troubleshoot, besides normal DoS attacks: rogue access points, simple RF interference, partially cut cables, rogue DHCP server, SNMP exploitation, etc. Sheesh, in most situations, you could just start a torrent from a high bandwidth seed(s); just max the upload and horrible latency will ensue.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.