Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

Provided by: Science Publications Topic: Mobility Format: PDF
In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition to the Wireless Station (WS) and Access Point (AP). The authentication server holds both normal and attacker databases. The attacker database can be constructed from the outcome of fuzzy decision making. After WS and AP registers itself with AS, WS sends authentication request message to AS through the nearest AP.

Find By Topic