Date Added: Jul 2009
IEEE 802.11 supports 802.1x to provide strong authentication mechanism for Wireless networks. 802.1x utilizes Extensible Authentication Protocol (EAP) as a framework for authentication, allowing for a number of authentication methods to be used. Unfortunately, 802.1x includes some unprotected EAP packets during authentication process which can be easily exploited by an attacker to start different types of Denial of Service (DoS) attacks over wireless networks. This paper developed an experimental framework to demonstrate and quantify possible flooding attacks using unprotected EAP frames against wireless communications. First the author setups a testbed wireless network in order to demonstrate how EAP flooding attacks take very little effort to bring a protected wireless network to a complete halt.