计算机应用

• 信息安全(Security of information) • 上一篇    下一篇

802.11协议中RTS/CTS机制的安全漏洞分析

陈伟 俞雷 张迎周   

  1. 南京邮电大学 南京邮电大学 南京邮电大学
  • 收稿日期:2008-08-05 修回日期:2008-09-12 发布日期:2008-12-01 出版日期:2008-12-01
  • 通讯作者: 陈伟

Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols

CHEN Wei Lei YU Ying-Zhou ZHANG   

  • Received:2008-08-05 Revised:2008-09-12 Online:2008-12-01 Published:2008-12-01
  • Contact: CHEN Wei

摘要: 802.11协议中的RTS/CTS机制可以解决隐藏节点问题,通过分析RTS/CTS机制中的安全漏洞,发现由于RTS/CTS握手过程中没有认证机制,攻击者可以通过连续发送设定足够大网络分配矢量值的伪造RTS/CTS帧,以达到拒绝服务攻击的目的。在理论分析的基础上,使用aircrack-ng的软件开发包,在真实的无线网络环境中进行了实验,实验结果显示,RTS/CTS机制确实存在着被拒绝服务攻击的安全漏洞,可随时被攻击者利用,需引起充分重视。

关键词: 无线安全, RTS/CTS机制, 802.11协议, 拒绝服务攻击, 无线局域网

Abstract: RTS/CTS mechanism in 802.11 protocol can solve the hidden nodes problem in wireless networks. The vulnerabilities in RTS/CTS mechanism were analyzed. Due to the lack of authentication in RTS/CTS handshakes, attackers can launch denial of service attacks by continuously sending spurious RTS/CTS frames with large enough NAV values. Based on theoretical analysis, experiment was implemented in practical wireless networks using aircrack-ng developing toolkit. The experimental results show that it is feasible to launch denial of service attacks against RTS/CTS mechanism. This vulnerability can be utilized by attacker at any time and should be paid more attention.

Key words: wireless security, RTS/CTS mechanism, 802.11 protocols, denial of service attack, wireless local area networks