Sei sulla pagina 1di 6

Redundancy handoff concept Detection and mitigation reliability of wireless 802.

11
Sigit wibawa
Universitas Mercu Buana, Indonesia
Email: sigitwibawa@ieee.org

Abstract device or mobile station (MS) is called a receiver, it wants


to be connected to Access Point (AP) in this case as a
Over the past 20 years, the IEEE 802.11 standard has been transmitter, either after power up, sleep mode, or shortly
highly developed, both in terms of functional and after entering the area within the reach of a new AP, the
performance. However, security is still a major concern, device must first find the nearest AP, then choose one to
especially for WLANs that are generally used. This paper connect to the AP, to find out if there is an AP available
describes various taxonomies of standard Wi-Fi, in the region, an MS who wants to connect with the AP
terminology in wireless networks and the main challenges can passively listen to the Beacon Frames broadcast by
in wireless networks, namely de-authentication [1] [2] [3] AP, this is called passive scanning or then send the frame
[4] [5] [6] [7]. At present and future mitigation lies in the Probe Request and wait for the response from the AP
reliability of a system and the right solution to overcome Probe and this called active scanning, after which MS
this problem is needed to answer this challenge we offer a determines which AP the best according to the selection
concept and propose an approach to securing WLAN by criteria used, then Authentication will be carried out. This
utilizing system reliability formulas using the Reliability process is the exchange of information between AP and
Block Diagram (RBD) configured redundant to identify MS, where each party has proven the authentication key
attacks, reactive and proactive defense strategies. We that becomes a secret together later when this wireless
utilize information from Physical Layer (PHY) and device is confirmed, it will begin the Association process
Medium Access Control (MAC) Layer [9]. Our evaluation (Association), which is the exchange of MS and AP
shows that the proposed solution successfully identifies information, only after this association process is
and remains the system to survive the attack. completed is the wireless device capable of sending and
Key word: WLAN, standard IEEE, de-authentication, receiving data frames. This process is shown in Figure 2.1
Redundant, Reliability

I. Introduction

In recent years Wireless technology has grown


"massively" and especially in the last decade the internet
has made a huge leap of almost all devices trying to be
connected with wireless technology. In the local area
wireless network (WLAN) we can connect to the Internet
without using a cable with only an Ethernet wireless
device which is a Network Interface Card that functions
to communicate between devices we can communicate
easily and with simple infrastructure. Now almost Figure 2.1. Process Association in IEEE 802.11
everyone in the world has wireless home networking
III. IEEE Standard Wireless Network
facilities and security technology also drastically
increases the creation of more and safer networks, as well In 1999, IEEE (Institute of Electrical and Electronics
as "hackers" also expanding their knowledge and adding Engineers) released 802.11 for Wi-Fi and used 2.4 GHz
their skills to disrupt networks or systems [7]. Frequency with a maximum data speed of 1-2 Mbps. Then
2 new discoveries were released in 2008, 802.11a and
II. Principle of Wireless Networks
802.11b standards. [7]
2.1 Wireless Network
802.11a runs at 5GHz frequency and 54Mbps speed and
Basically the wireless network serves to connect at least 802.11 b standard speeds up to 11 Mbps at 2.4 GHz
two devices to communicate with each other in certain frequency.
areas with the transmission media using radio frequency
(RF) with a certain frequency. When a mobile wireless
But these two inventions could not communicate with
each other, this limitation gave birth to a new 802.11g
standard that supports speeds of up to 54 Mbps and is
compatible in communicating with 802.11 standards b,
There are other standards that are now used by the wider
community, namely:
Figure 4.1 Handoff process on Extended Service Set
1. 802.11n - This standard basically improves the 802.11 with Distributed System
standard [3] by adding new MIMO (Multiple Input
Multiple Output) technology. This standard operates on 4. The Channel IEEE 802.11 standard has defined
both the 2.4 GHz and 5GHz frequency bands. This was different frequency ranges and bandwidths such as 2.4
launched this month in October 2009. GHz, 5 GHz, and so on. Each of these ranges is further
divided into several channels. Each country has its own
2. 802.11ac - This standard was launched that year in rules and channels as shown in Figure 4.2
December 2013. If we compare this standard of 802.11n
and 802.11ac standards then 802.11ac is a better standard
because of its speed up to 300 Mbps, in theory the
frequency width can reach 160 MHz in addition also
introduced features enhancements from MIMO called
MU-MIMO or Multi User MIMO. Figure 4.2 channel and frequency of IEEE 802.11
IV. Terminology used in wireless networks standards

The basic terminology used in Wireless networks is as When we consider the illustration of the use of the 2.4
follows: GHz frequency by the 14 channels, such as overlapping,
this causes interference problems that will cause damage
1. Service Set Identification (SSID) is the name of a to the data sent and received, so that a good channel usage
wireless network that must exist and is very important to strategy is needed, we must choose channels that do not
be able to connect and join a network, the first time we do interfere with each other so that data and performance can
a network configuration we will be asked to specify the be optimal.
network name or SSID to be used.
5. Management frames in the IEEE 802.11 standard there
2. The Basic Service Set Identifier (BSSID) has the is a rule in which there are general provisions, namely:
understanding that in an infrastructure topology there is at
least one AP that acts as a transmitter, there is an address • Frame Authentication
called the MAC Address, which is a mutually agreed upon • Frame De-authentication
identity owned by a wireless device, from this address we • Frame Association
coordinate and synchronize forwarding and broadcasting • Frame Association Request
data packets, this function is almost the same as bridge • Frame Association Response
technology in wired network methods. • Frame Reassociation Response
• Frame Disassociation
3. Extended Service Set Identification (ESSID) in a large
• Frame Beacon
network, an AP is not enough to serve all clients, let alone
• Frame Probe Request
the network is in a separate area, the AP signal will not
• Frame Probe Response
reach because it is used by several APs. Each AP is
arranged in a different channel to avoid interference, so 6. Reliability Block Diagram (RBD) Redundant
that it forms a network such as a cellular network, each configuration, Reliability Block Diagram (RBD) which is
client or user can do handoff or roaming easily without configured as Redundant is a method that measures the
losing service signals, in other words it can function to reliability of a complex system and has a redundant
forward from a radio cell to a cell other via a cable configuration (has a backup component that functions the
network. The combination of AP and cable network will same as the system element) [21].
form the so-called Distributed System (DS) as shown in
Figure 4.1 RBD with Redundant configuration is the ability of a
system to function normally even though there are
elements that are not functioning. This is usually achieved V. The main challenge at this time
by having backup components that function the same as
system elements [22]. For simulation and testing for resistance and interference,
the ESP8266 IOT Module [17], [18], [19], [20] is used,
Redundant is the same as k out of n system where a system which is a complete chip which includes processor,
n component works well if and only if at least k of n memory and also access to GPIO. This causes ESP8266
components works well. Redundant is used in continuous to directly replace Arduino and added to its ability to
equipment / machine conditions and is required to have a support wi-fi connections directly. ESP8266 is a wi-fi
backup system with an IID machine (Identic independent module that functions as a wireless microcontroller
distribution), the number of machines working follows the support device and makes TCP / IP connections. This
binomial distribution with parameters n and p. The module uses approximately 3.3 Volts with three wi-fi
reliability of the system is the same as the probability that modes, namely Station, Access Points and Both. This
the number of working machines is greater than or equal module is also equipped with a processor, memory and
to k [22]: GPIO to carry out this microcontroller attack simulation
can be relied upon, ESP8266 module based on Ethernet
and wireless there are several types that can be found on
………………. (1) the market but actually have the same function the
difference lies only in the GPIO pin provided.
information:

n: Number of APs in the system.

i: The minimum number of APs that must function for out


of the system.

p: Reliability of AP when all iid machines.


Figure 5.1 some types of ESP8266
Q: Not machine reliability when all iid machines, q = 1-p.
small size, this board is equipped with wireless features
Equation (1) is an explicit formula that can be used to
evaluate reliability of out of system. From the equation for and the firmware is open source. In ESP8266 important
system reliability given above. In this study Redundant specifications found on this board are [17], [18], [19],
with the number of machines working follows a binomial
[20]:
distribution with the parameters n = 5, k = 4 and p is the
average RBD value of 5 AP. ▪ ESP8266 Serial Wi-Fi SoC (single on Chip),

The approach to a system reliability is often modeled onboard USB to TTL


using a network (network) where the components of a ▪ Support Wireless IEEE 802.11b/g/n
system are connected in a series, parallel relationship ▪ 9 GPIO (3 pin PWM, 1 x ADC Channel, and pin
pattern, and a series and parallel combination of this
approach we apply that each attack or interference is RX TX) Wi-Fi Direct (P2P / Point-to-Point),
analogous to a system failure so it needs there is a concept Soft-AP / Access Point TCP/IP Protocol, support
of a network model that is capable and reliable for
WEP, TKIP, AES, and WAPI, Integrated CPU
managing attacks so that the reliability model is applied
as illustrated in Figure 3.3 32-bit

Figure 5.2 Block diagram and ESP8266 module used

Figure 4.3. Serial and Parallel standby redundancy To run certain functions a module such as ESP8266
requires a programming language to run, it requires
development tool programs such as Arduino IDE Figure 5.3 Scan AP Application Menu ESP8266
(Integrated Development Environment) which is software Second step: determine the target to be attacked
that can be used by designers to perform various processes after determining the target we will be asked to do the type
related to programming microcontroller modules such as of attack that will be shown to the target of the choice
Arduino including modules ESP8266, this IDE already there is De-auth, Beacon and Probe-Request we can
supports various operating systems such as Windows, choose one or all three of these types of attacks carried out
Linux and others.

a) Three intervening gaps in the management frame


In the de-authentication frame, the Frame Beacon and
Probe Request frames [9] are generally considered to be
management frames in the 802.11 standard [7], [9] this
can be used to decide the Station or client with AP. We
Figure 5.4 Attacks Application Menu ESP8266
use the ESP8266 module which is equipped with a
After we choose one of the attacks the ESP8266 module
program to send an 'attack' and is able to disconnect
will restart then after power mode on will continue to
communication without having to enter the network.
carry out a 'standalone' attack so that the victim cannot
b) How is work?
communicate with the AP
The frame management was asked to decide the
communication between the station and AP. Frame
management is unencrypted and unauthenticated so that
this request process is immediately carried out to
disconnect the receiving station with AP, then it is made
to cancel the secure connection between the AP and the
receiving station. We will show a practical session with Figure 5.5 Illustration of attack
the following explanations: If every attack to AP as illustrated in Figure 5.5 is
First step: connect with ESP8266 module considered to be an imperfect AP, it means that the AP has
After the SSID module is detected and prompted for a the opportunity to fail to move the work function of
password, we will enter the menu using the browser component A when it fails to go to component B. If the
application and type the address: 192.168.4.1 then enter chance of a successful AP doing its job is Ps, then the
later like Figure 5.3 and then scan to find out the wireless chance of a switch failure will be
devices around us. Qs = (1 – Ps).
This problem can then be solved by the concept of
conditional probability where:
P (system fault) = P (system fault if AP is successful) x P
(AP success) + P (system fault because AP fault) x P (AP
fault)
The above statement can be translated mathematically
into:
Q = QA.QB.Ps + QA.Qs the attack, in the future our proposal is to prepare an AP
= QAQBPs + QA(1-Ps) device with more than one MAC address to anticipate this
= QAQBPs + QA – QAPs type of attack besides having reliability because it has
=QA–QAPs(1-QB)............................ redundancy capability.
If the AP is connected to component B (component A
standby), then :Q=QB–QBPs(1-QA)...........................

References
[1] A Novel Classification Scheme for 802.11 WLAN Active Attacking
Figure 5.6 Standby Redundancy Traffic Patterns Wenzhe Zhou, Alan Marshall and Qiang Gu School of
This mathematical approach to standby redundancy Electrical & Electronic Engineering, Queen’s University, Belfast,

answers the failure of the system by ensuring the UK,2006


[2] Detecting and Reducing the Denial of Service attacks in WLANs
continuity of connectivity between the STA and the AP
Rajeev Singh Department of Computer Engineering GB Pant University,
that is attacked, the purpose of which is to keep the user Pantnagar Udham Singh Nagar (Uttarakhand), India, Teek Parval
or STA still getting services to communicate as in Figure Sharma Department of Computer Engineering National Institute of

5.7 Technology Hamirpur (H.P.), India 2011


[3] Impact of Metric Selection on Wireless De-Authentication DoS
Attack Performance
Jonny Milliken, Member, IEEE, Valerio Selis, Kian Meng Yap,
Member, IEEE, and Alan Marshall, Senior Member, IEEE, IEEE
WIRELESS COMMUNICATIONS LETTERS, VOL. 2, NO. 5,
OCTOBER 2013
[4] Detection of De-authentication Denial of Service attack in 802.11
networks Mayank Agarwal, Santosh Biswas, Sukumar Nandi
Figure 5.7 The Access Point is set configuration into Department of CSE, IIT Guwahati, India 2013 Annual IEEE India
Conference (INDICON)
standby Redundancy
[5] Analysis of the Implementation Characteristics of DDoS Attacks on
Conclusion and recommendation
Wi-Fi Networks Andri Dovhan, Maria Grabar Telecommunication
To fight and defend against attacks due On the de- Systems Departament Kharkiv National University of Radio electronics
authentication frame, the Frame Beacon and Probe Kharkiv, Ukraine
[6] Profiling and Mitigating Brute Force Attack in Home Wireless LAN
Request frames cannot be avoided by blocking the process
Mohd Yusof Mohammad Hafiz, Fakariah Hani Mohd Ali Department of
but the solution is to prepare for anticipation of the attack
Computer Technology and Networking Faculty of Computer and
by proposes a system reliability formula approach by Mathematical Sciences, Universiti Teknologi MARA, 40450 Shah
using Reliability Block Diagrams (RBD) which are Alam, Selangor, MALAYSIA
[7] Wireless Network Security: Tough Times
configured redundant to identify attacks, this reactive and
Utkarsh Wadhwa B. Tech (3/'d Year) Department of Information
proactive defense strategy is done in a simple way by
Technology Galgotias College of Engineering and Technology Greater
using the same SSID with the same password on an AP Noida, India
network. Our evaluation shows that the proposed solution 2015 International Conference on Green Computing and Internet of
Things (ICGCloT)
successfully identifies and remains the system to survive
[8] Detection of De-authentication DoS attacks in Wi-Fi Networks: A Raja Sattiraju, Pratip Chakraborty and Hans D. Schotten University of
Machine Learning Approach Kaiserslautern
Mayank Agarwal, Santosh Biswas, Sukumar Nandi Department of Kaiserslautern, Germany Globecom 2014 Workshop - Ultra-Low
Computer Science & Engineering Indian Institute of Technology, Latency and Ultra-High Reliability in Wireless Communication
Guwahati - 781039, India 2015 IEEE International Conference on [17] ESP8266 based Implementation of Wireless Sensor Network with
Systems, Man, and Cybernetics Linux Based Web-Server Tejas Thaker M.E.-VLSI AND ESD GTU PG
[9] Mac Layer Management Frame Denial of Service Attacks SCHOOL Gandhinagar, India 2016 Symposium on Colossal Data
Jaspreet Kaur Department of Information Technology Indira Gandhi Analysis and Networking (CDAN)
Delhi Technical University for Women, Delhi, India [18] Implementation of WiFi-Based Single Phase Smart Meter for
2016 International Conference on Micro-Electronics and Internet of Things (IoT) Win Hlaing The Sirindhorn International Thai-
Telecommunication Engineering German Graduate School of Engineering (TGGS) King Mongkut’s
[10] Detection and Mitigation of Wireless Link Layer Attacks University of Technology North Bangkok,Thailand 5th International
May Aye Chan Aung, Khin Phyo Thant Myanmar University of Electrical Engineering Congress, Pattaya, Thailand, 8-10 March 2017
Computer Studies, Mandalay, Myanmar IEEE SERA 2017, June 7-9, [19] Estimate Distance Measurement using NodeMCU ESP8266 based
2017, London, UK on RSSI Technique Suvankar Barai1, Debajyoti Biswas2 and
[11] FADEWICH: Fast Deauthentication over the Wireless Channel Buddhadeb Sau3 Department of Mathematics, Jadavpur University,
Mauro Conti University of Padua,Italy, Giulio Lovisotto University of Kolkata- 700032, India, Proceedings of 2017 IEEE CAMA, Tsukuba,
Oxford,UK, Ivan Martinovic University of Oxford UK, Gene Tsudik Japan
University of California, Irvine USA. [20] IOT Based Controlling of Hybrid Energy System using ESP8266
2017 IEEE 37th International Conference on Distributed Computing Prakhar Srivastava Department of Electrical Engineering DIT University
Systems Dehradun, India
[12] Identifying Malicious Traffic in Software-Defined Wireless Local Mohit Bajaj Department of Electrical Engineering NIT Delhi Delhi,
Area Networks India
Radoslaw Cwalinski and Hartmut Koenig Computer Networks and Ankur Singh Rana Department of Electrical Engineering Jamia Millia
Communication Systems Group, Brandenburg University of Islamia Delhi, India 2018 IEEMA Engineer Infinite Conference
Technology Cottbus-Senftenberg, de. (eTechNxT)
2018 Workshop on Computing, Networking and Communications (CNC) [21] Ebeling, Charles E. (1997), An Introduction to Reliability and
[13] A Mesh Network Reliability Analysis Using Reliability Block Maintainability Engineering, Me Graw Hill Book Co., Singapore.
Diagram [22] Optimal Reliability Modeling: Principles and Applications. Front
Cheng-Min Lin, Hui-Kang Teng†, Cheng-Chih Yang‡, Hwei-Li Weng*, Cover. Way Kuo, Ming J. Zuo. John Wiley & Sons, Feb 17, 2003
Ming-Cheng Chung, Chiu-Chiao Chung Department of Computer and
Communication Engineering, Nan Kai University of Technology
Graduate Institute of Electrical Engineering, Nan Kai University of
Technology, 2010 IEEE
[14] Formal Reliability Analysis of Wireless Sensor Network Data
Transport Protocols using HOL
Waqar Ahmed and Osman Hasan School of Electrical Engineering and
Computer Science National University of Sciences and Technology
Islamabad, Pakistan, Sofi`ene Tahar Department of Electrical and
Computer Engineering Concordia University Montreal, QC, Canada,
The Second International Workshop on Cooperative Wireless Networks
– 2015
[15] RELIABILITY OF COMPUTER SYSTEMS AND NETWORKS,
BOOK
Martin L. Shoom, 2002, JOHN WILEY publishing since 1807
[16] Reliability Analysis of a Wireless Transmission as a Repairable
system

Potrebbero piacerti anche