首页 | 官方网站   微博 | 高级检索  
     

802.11协议中RTS/CTS机制的安全漏洞分析
引用本文:陈伟,俞雷,张迎周.802.11协议中RTS/CTS机制的安全漏洞分析[J].计算机应用,2008,28(12):3183-3186.
作者姓名:陈伟  俞雷  张迎周
作者单位:南京邮电大学 南京邮电大学 南京邮电大学
基金项目:国家自然科学基金 , 江苏省高校自然科学基金 , 南京邮电大学攀登计划  
摘    要:802.11协议中的RTS/CTS机制可以解决隐藏节点问题,通过分析RTS/CTS机制中的安全漏洞,发现由于RTS/CTS握手过程中没有认证机制,攻击者可以通过连续发送设定足够大网络分配矢量值的伪造RTS/CTS帧,以达到拒绝服务攻击的目的。在理论分析的基础上,使用aircrack-ng的软件开发包,在真实的无线网络环境中进行了实验,实验结果显示,RTS/CTS机制确实存在着被拒绝服务攻击的安全漏洞,可随时被攻击者利用,需引起充分重视。

关 键 词:无线安全    RTS/CTS机制    802.11协议    拒绝服务攻击    无线局域网
收稿时间:2008-08-05
修稿时间:2008-09-12

Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
CHEN Wei,YU Lei,ZHANG Ying-zhou.Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols[J].journal of Computer Applications,2008,28(12):3183-3186.
Authors:CHEN Wei  YU Lei  ZHANG Ying-zhou
Affiliation:CHEN Wei,1,2 YU Lei1,ZHANG Ying-zhou1,21.College of Computer,Nanjing University of Posts , Telecommunications,Nanjing Jiangsu 210003,China,2.Institute of Computer Technology
Abstract:RTS/CTS mechanism in 802.11 protocol can solve the hidden nodes problem in wireless networks. The vulnerabilities in RTS/CTS mechanism were analyzed. Due to the lack of authentication in RTS/CTS handshakes, attackers can launch denial of service attacks by continuously sending spurious RTS/CTS frames with large enough NAV values. Based on theoretical analysis, experiment was implemented in practical wireless networks using aircrack-ng developing toolkit. The experimental results show that it is feasible to launch denial of service attacks against RTS/CTS mechanism. This vulnerability can be utilized by attacker at any time and should be paid more attention.
Keywords:wireless security  RTS/CTS mechanism  802  11 protocols  denial of service attack  wireless local area networks
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号