Abstract
With the help of satellites, the entire surface of the world can be covered, which provides the high speedy communications all over the world. Consequently, security is becoming an important concern in the satellite multicast communications. However, due to the inherent dynamic broadcast nature of the communication medium, this multicast system is easily susceptible to interferences and interceptions. In addition, the satellite system generally has a large number of terminal members with the high frequent join-leave characteristic. Therefore, the satellite systems face significant security challenges. The denial of service (DoS) is one of the most harmful attacks to the satellite systems and also terrestrial fixed or mobile networks. It can maliciously prevent legitimate users from accessing the service. It is especially true for the disassociation DoS attacks where an attacker sends bogus disassociation requests to disable the communication between the server and their legitimate clients. In this paper, the main focus of our work is to detect and defend against the disassociation DoS attacks on the satellite system. We also provide preliminary modeling verifications and simulation results regarding the efficiency and practicability of this new approach. Further analysis of the proposed method is also appended to demonstrate its feasibility.
Similar content being viewed by others
References
Richharia M., Westbrook L. D. (2010) Satellite systems for personal applications: Concepts and technology (1st ed.). Wiley, London
Beaumont, J.-F., & Doucet, G., (2007). Threats and vulnerabilities of next generation satellite personal communications systems: A defense perspective. In Globecom workshops, 2007 IEEE (pp. 1–5). doi:10.1109/GLOCOMW.2007.4437787.
Micha, S., Michael, G., Car, A. G., Sanjeev, K., & Santosh, S. V. (2005). Mitigating DoS attack through selective bin verification. In Secure network protocols, 1st IEEE ICNP workshop, 2005 (pp. 7–12).
Zhou, B., Marshall, A., Zhou, W., & Yang, K. (2008). A random packet destruction DoS attack for wireless networks. In Communications ICC’08 IEEE international conference (pp. 1658–1662).
Wang, L., & Srinivasan, B. (2010). Analysis and improvements over DoS attacks against IEEE 802.11i standard, networks security wireless communications and trusted computing. In 2010 second international conference (pp. 109–113).
Kiuchi, T., Hori, Y., Hori, K., & Sakurai, K. (2010). A design of history based traffic filtering with probabilistic packet marking against DoS Attacks. In 2010 10th annual international symposium on applications and the internet (pp. 261–264).
Sirikarn, P., Vasaka, V., & Panita, P. (2007) Lightweight detection of DoS attacks. In Networks, ICON 2007 15th IEEE international conference (pp. 77–82).
Chiang J. T., Hu Y.-C. (2012) Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transaction on Networking 19(1): 286–298
Henderson, T. (1999) Networking over next-generation satellite systems. Ph.D. thesis, University of California at Berkeley.
Taleb, T., Kato N., & Nemoto, Y. (2004) A round-trip time-based prevention technique to secure LEO satellite networks from denial-of-service attacks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-Fall, September 26–29, 2004 (Vol. 6, pp. 4012–4016).
Onen, M., & Molva, R. (2004). Denial of service prevention in satellite network. In 2004 IEEE international conference on communications, June 20–24, 2004 (Vol. 7, pp. 4387–4391)
European Standard: ENSI EN 301 790 V1.5.1. (2009-05). Digital video broadcasting; interaction channel for satellite distribution systems (pp. 135–151).
Aslam, B., Islam, M. H., & Khan, S. A. (2006). Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In Proceedings of the first mobile computing and wireless communication international conference. MCWC2006 (pp. 215–220). DOI:10.1109/MCWC.2006.4375224.
SpoofMAC. www.klcconsulting.net/smac/.
MAC Changer. www.alobbs.com/macchanger/.
Airsnarf. www.airsnarf.shmoo.com.
Buchmann, J., & Kaiser, M. (2007). Computer proven correctness of the rabin public-key scheme (Vol. 27). World Academy of Science, Engineering and Technology.
Ratzer, A., Wells, L., Lassen, H., Laursen, M., Qvortrup, J., Stissing, M., et al. (2003). CPN tools for editing, simulating, and analyzing coloured petri nets, applications and theory of petri nets (pp. 450–462).
CPN Tools. Homepage: http://wiki.daimi.au.dk/cptools/cpntools.wiki.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ma, T., Lee, Y.H. & Ma, M. Protecting Satellite Systems from Disassociation DoS Attacks. Wireless Pers Commun 69, 623–638 (2013). https://doi.org/10.1007/s11277-012-0593-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0593-7