Files in this item

FilesDescriptionFormat

application/pdf

application/pdfChoi_Jihyuk.pdf (5MB)
(no description provided)PDF

Description

Title:Security threats to the MAC-layer in wireless networks
Author(s):Choi, Jihyuk
Director of Research:Hu, Yih-Chun
Doctoral Committee Chair(s):Hu, Yih-Chun
Doctoral Committee Member(s):Borisov, Nikita; Caesar, Matthew C.; Vaidya, Nitin H.
Department / Program:Electrical & Computer Eng
Discipline:Electrical & Computer Engr
Degree Granting Institution:University of Illinois at Urbana-Champaign
Degree:Ph.D.
Genre:Dissertation
Subject(s):Medium access protocol
Wireless networks
Security
Abstract:Medium access control (MAC) protocol security is important in wireless networks due to the lack of physical access control that normally exists in wired networks in the form of connecting a cable. Most efforts in standards organizations and academic research focus on the requirements of confidentiality and authentication. These approaches to wireless MAC-layer security often ignore two other threats to security: attacks against availability and incorrect implementation of MAC protocol and driver routines. The former can prevent a user from communicating at all, whereas the latter can have consequences ranging from dropped packets to complete host compromise. This dissertation comprehensively investigates the threats against wireless MAC protocols: being uncooperative, denial-of-service (DoS), sniffing, man-in-the-middle (MITM), and fuzzing. I provide a mathematical model to understand how network parameters impact the uncooperative carrier-sense-misbehaving attackers. Next, this dissertation shows a novel DoS attack that targets queuing behavior of access points by exploiting some factors of the IEEE 802.11 MAC protocol. Further, I propose a scheme that establishes a wireless connection that is secure against sniffing and MITM between a client device and an access point in IEEE 802.11 hotspots. Finally, I propose MAC-layer threats including fuzzing in IEEE 802.16e mobile WiMAX networks.
Issue Date:2012-09-18
URI:http://hdl.handle.net/2142/34282
Rights Information:Copyright 2012 Jihyuk Choi
Date Available in IDEALS:2012-09-18
Date Deposited:2012-08


This item appears in the following Collection(s)

Item Statistics