Loading

Optimized De-Authentication Attack in IEEE 802.11 Networks
G. Mani Chandra1, K. Raghava Rao2, P.N.S.B.S.V Prasad V3

1G. Mani Chandra, Department of ECM, Koneru Lakshmaiah Educational Foundation, Vijayawada, (Andhra Pradesh), India.
2P N S B S V Purna V, Master’s Student, Department of ECM, Koneru Lakshmaiah Educational Foundation, Vijayawada, (Andhra Pradesh), India.
3K Raghava Rao, Professor, Department of ECM, Koneru Lakshmaiah Educational Foundation, Vijayawada, (Andhra Pradesh), India.

Manuscript received on 23 March 2019 | Revised Manuscript received on 30 March 2019 | Manuscript published on 30 March 2019 | PP: 788-793 | Volume-7 Issue-6, March 2019 | Retrieval Number: F2428037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless attacks, of late, have become the foremost threat in the field of Wi-Fi technology. This is mainly attributed to the lack of easy and affordable monitoring systems that can recognize behaviors of patterns in different attacks. MAC layer vulnerabilities are main reasons for the significant number of DDoS/DoS attacks in Wi-F access points. During the implementation of De-authentication attack, an attacker transmits a bulk of spoofed De-authenticated frames to the legitimate clients/users, which result in the disconnection from the Wi-Fi access point to which they are connected. Existing techniques of De-authentication-DoS attack rely on the encryption algorithm and protocol modifications. Nevertheless, this paper mainly focuses on the implementation of De-authentication attack in a smart way by localizing the client movement in Wi-Fi networks. In particular, we present a new attack and its experimental set up, and demonstrate its De-authentication.
Keywords: RSSI, RF Localization, Wireless Intrusion Detection System, De-authentication
Scope of the Article: System Integration