A Study of the TKIP Cryptographic DoS Attack
- 1 November 2007
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 15312216,p. 59-65
- https://doi.org/10.1109/icon.2007.4444062
Abstract
The contribution of the paper is to study the cryptographic DoS attack in a testbed environment. We have shown the correct mechanism for an 802.11 message modification attack, described the implementation of this attack using a middleperson approach and compared the TKIP and Harkins countermeasures in a controlled environment. The cryptographic DoS attack is demonstrated to be practical and can be mounted by a single adversary with limited resources. This attack requires very little work on behalf of a hostile adversary and will bring TKIP-protected traffic to a complete halt. The threat of this attack being used to accomplish a security-level rollback should not be underestimated. The Harkins countermeasures address this threat by reacting in a more measured manner to active key recovery attacks.Keywords
This publication has 7 references indexed in Scilit:
- Wireless intrusion detection and response: a classic study using main-in-the-middle attackPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A Note on the Fragility of the “Michael” Message Integrity CodeIEEE Transactions on Wireless Communications, 2004
- Analysis of the 802.11i 4-way handshakePublished by Association for Computing Machinery (ACM) ,2004
- Detection and handling of MAC layer misbehavior in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Improving the security of wireless LANs by managing 802.1x disassociationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Security flaws in 802.11 data link protocolsCommunications of the ACM, 2003
- Intercepting mobile communicationsPublished by Association for Computing Machinery (ACM) ,2001