Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Protecting Satellite Systems from Disassociation DoS Attacks

Published: 01 March 2013 Publication History

Abstract

With the help of satellites, the entire surface of the world can be covered, which provides the high speedy communications all over the world. Consequently, security is becoming an important concern in the satellite multicast communications. However, due to the inherent dynamic broadcast nature of the communication medium, this multicast system is easily susceptible to interferences and interceptions. In addition, the satellite system generally has a large number of terminal members with the high frequent join-leave characteristic. Therefore, the satellite systems face significant security challenges. The denial of service (DoS) is one of the most harmful attacks to the satellite systems and also terrestrial fixed or mobile networks. It can maliciously prevent legitimate users from accessing the service. It is especially true for the disassociation DoS attacks where an attacker sends bogus disassociation requests to disable the communication between the server and their legitimate clients. In this paper, the main focus of our work is to detect and defend against the disassociation DoS attacks on the satellite system. We also provide preliminary modeling verifications and simulation results regarding the efficiency and practicability of this new approach. Further analysis of the proposed method is also appended to demonstrate its feasibility.

References

[1]
Richharia, M., & Westbrook, L. D. (2010). Satellite systems for personal applications: Concepts and technology (1st ed.). London: Wiley.
[2]
Beaumont, J.-F., & Doucet, G., (2007). Threats and vulnerabilities of next generation satellite personal communications systems: A defense perspective. In Globecom workshops, 2007 IEEE (pp. 1-5).
[3]
Micha, S., Michael, G., Car, A. G., Sanjeev, K., & Santosh, S. V. (2005). Mitigating DoS attack through selective bin verification. In Secure network protocols, 1st IEEE ICNP workshop, 2005 (pp. 7-12).
[4]
Zhou, B., Marshall, A., Zhou, W., & Yang, K. (2008). A random packet destruction DoS attack for wireless networks. In Communications ICC'08 IEEE international conference (pp. 1658-1662).
[5]
Wang, L., & Srinivasan, B. (2010). Analysis and improvements over DoS attacks against IEEE 802.11i standard, networks security wireless communications and trusted computing. In 2010 second international conference (pp. 109-113).
[6]
Kiuchi, T., Hori, Y., Hori, K., & Sakurai, K. (2010). A design of history based traffic filtering with probabilistic packet marking against DoS Attacks. In 2010 10th annual international symposium on applications and the internet (pp. 261-264).
[7]
Sirikarn, P., Vasaka, V., & Panita, P. (2007) Lightweight detection of DoS attacks. In Networks, ICON 2007 15th IEEE international conference (pp. 77-82).
[8]
Chiang, J. T., & Hu, Y.-C. (2012). Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transaction on Networking, 19(1), 286-298.
[9]
Henderson, T. (1999) Networking over next-generation satellite systems. Ph.D. thesis, University of California at Berkeley.
[10]
Taleb, T., Kato N., & Nemoto, Y. (2004) A round-trip time-based prevention technique to secure LEO satellite networks from denial-of-service attacks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-Fall, September 26-29, 2004 (Vol. 6, pp. 4012-4016).
[11]
Onen, M., & Molva, R. (2004). Denial of service prevention in satellite network. In 2004 IEEE international conference on communications, June 20-24, 2004 (Vol. 7, pp. 4387-4391).
[12]
European Standard: ENSI EN 301 790 V1.5.1. (2009-05). Digital video broadcasting; interaction channel for satellite distribution systems (pp. 135-151).
[13]
Aslam, B., Islam, M. H., & Khan, S. A. (2006). Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In Proceedings of the first mobile computing and wireless communication international conference. MCWC2006 (pp. 215-220). 2006.4375224.
[14]
SpoofMAC. www.klcconsulting.net/smac/.
[15]
MAC Changer. www.alobbs.com/macchanger/.
[16]
Airsnarf. www.airsnarf.shmoo.com.
[17]
Buchmann, J., & Kaiser, M. (2007). Computer proven correctness of the rabin public-key scheme (Vol. 27). World Academy of Science, Engineering and Technology.
[18]
Ratzer, A., Wells, L., Lassen, H., Laursen, M., Qvortrup, J., Stissing, M., et al. (2003). CPN tools for editing, simulating, and analyzing coloured petri nets, applications and theory of petri nets (pp. 450-462).
[19]
CPN Tools. Homepage: http://wiki.daimi.au.dk/cptools/cpntools.wiki.
  1. Protecting Satellite Systems from Disassociation DoS Attacks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Wireless Personal Communications: An International Journal
      Wireless Personal Communications: An International Journal  Volume 69, Issue 2
      March 2013
      472 pages

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 March 2013

      Author Tags

      1. Denial of service (DoS)
      2. Disassociation
      3. Satellite system
      4. Sequence number

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Jan 2025

      Other Metrics

      Citations

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media