Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 2013 978-1-4673-5845-3/13/$31.00©2013 IEEE Simulation and Analysis of RTS/CTS DoS Attack Variants in 802.11 Networks PMD Nagarjun School of Information Technology & Engineering, VIT University Vellore, India. pmd.nagarjun@gmail.co m V Anil Kumar CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India anil@cmmacs.ernet.in Ch Aswani Kumar School of Information Technology & Engineering, VIT University Vellore, India. cherukuri@acm.org Ahkshaey Ravi CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India ahkshay@isim.net.in AbstractDenial-of-Service attacks (DoS) have become a widespread problem on the Internet. These attacks are easy to execute. Low rate attacks are relatively new variants of DoS attacks. Low rate DoS attacks are difficult to detect since attacker sends attack stream with low volume and the countermeasures used to handle the high rate DoS attacks are not suitable for these types of attacks. RTS/CTS attack is one type of Low rate DoS attack. In this paper, we analyze RTS/CTS attack which exploits the medium reservation mechanism of 802.11 networks through duration field. We propose variants of RTS/CTS attacks in wireless networks. We simulate the attacks behaviour in ns2 simulation environment to demonstrate the attack feasibility as well as potential negative impact of these attacks on 802.11 based networks. We have created an application that has the capability to create test bed environment for the attacks, perform RTS/CTS attacks and generate suitable graphs to analyze the attack's behaviour. We also briefly discuss possible ways of detecting and mitigating such Low rate DoS attacks in wireless networks. Keywords802.11 MAC Layer, Low rate Denial-of-Service attacks, RTS/CTS attack. I. INTRODUCTION The 802.11 standard specifies a common media access control (MAC) layer, which provides variety of functions that support the operation of wireless LANs. In general, the MAC layer manages and maintains communication between 802.11 stations by coordinating access to a shared radio channel and utilizing protocols that enhance communication over a wireless medium. The 802.11 MAC layer uses a dedicated physical layer, such as 802.11b or 802.11a, to perform the tasks of carrier sensing, transmission and receiving of 802.11 frames. The 802.11 wireless communications happens in two ways: Infrastructure mode and Ad-hoc mode. In Infrastructure mode, channel allocation between different nodes is controlled by a centralized node known as access point (AP). In Ad-hoc mode there is no designated centralized node to coordinate the channel allocation. In such cases, the channel allocation process is distributed among nodes. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) [1] is the channel access mechanism used by most wireless LANs. The protocol starts by listening on the channel (this is called carrier sense), and if it is found to be idle, it sends the first packet in the transmit queue. If it is busy (either another node transmission or interference), the node waits till the end of the current transmission and then starts the contention timer (wait a random amount of time). When its contention timer expires, if the channel is still idle, the node sends the packet. In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is visible from a wireless AP, but not from other nodes communicating with the AP. This leads to difficulties in media access control. A simple and elegant solution to this hidden terminal problem is to use Request to Send/Clear to Send (RTS/CTS) frames [2]. RTS/CTS is a handshaking mechanism to reserve the channel for a specific duration before actual data transfer starts. The frame formats for RTS and CTS are as shown in Fig. 2 and Fig. 3 respectively. Figure 1 shows the use of RTS and CTS with the Network Allocation Vector (NAV) value set [8]. After waiting for Distributed Interframe Space (DIFS) the sender issues a RTS packet. The RTS packet contains the duration of the whole data transmission. This duration specifies the time interval necessary to transmit the whole data frame and the acknowledgement related to it. Every node receiving this RTS now has to set its NAV in accordance with the duration field. The NAV specifies the earliest point at which stations can try to access the medium again. If the receiver receives the RTS, it replies with a CTS packet after waiting Short Interframe Space (SIFS) time. This CTS packet contains the duration field again and all stations receiving this packet from the receiver of the intended data transmission have to adjust their NAV. Now all the nodes within the receiving distance are informed that they have to wait for more time before accessing the medium. Basically this mechanism reserves the medium for one sender exclusively and hence the name, virtual reservation scheme [7]. II. RELATED WORK Vikram Gupta et al. [3] in their work exploited some of vulnerabilities existed in 802.11 MAC layer in wireless Ad-hoc environment. According to them the fundamental reason for DoS at MAC layer is due to the unfairness in media access, as well as the End-to-End authentication scheme in