scholarly journals Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey

Electronics ◽  
2019 ◽  
Vol 8 (10) ◽  
pp. 1095 ◽  
Author(s):  
Zawar Shah ◽  
Steve Cosgrove

Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its stateless nature and lack of authentication. One such spoofing attack is the ARP Cache Poisoning attack, in which attackers poison the cache of hosts on the network by sending spoofed ARP requests and replies. Detection and mitigation of ARP Cache Poisoning attack is important as this attack can be used by attackers to further launch Denial of Service (DoS) and Man-In-The Middle (MITM) attacks. As with traditional networks, an ARP Cache Poisoning attack is also a serious concern in Software Defined Networking (SDN) and consequently, many solutions are proposed in the literature to mitigate this attack. In this paper, a detailed survey on various solutions to mitigate ARP Cache Poisoning attack in SDN is carried out. In this survey, various solutions are classified into three categories: Flow Graph based solutions; Traffic Patterns based solutions; IP-MAC Address Bindings based solutions. All these solutions are critically evaluated in terms of their working principles, advantages and shortcomings. Another important feature of this survey is to compare various solutions with respect to different performance metrics, e.g., attack detection time, ARP response time, calculation of delay at the Controller etc. In addition, future research directions are also presented in this survey that can be explored by other researchers to propose better solutions to mitigate the ARP Cache Poisoning attack in SDN.

2019 ◽  
Vol 8 (2S11) ◽  
pp. 2889-2893

The Internet of Things is the network of numerous devices and communicate with an internet by using the IP address. The IOT objects shares the information using wireless connection. During the data transmission, that can be distorted by the Hackers by knowing their IP address. In IOT (Internet of Things), the wireless communication between the devices makes the users to be vulnerable. So, the hackers may spoof the MAC address of the communicating devices. The receiver MAC address is identified and then false MAC (Media Access Control) address is created by the hacker. Then, attackers replaces the original MAC address in the ARP (Address Resolution Protocol) table of the sender. So,the hackers may impersonate like the sender. Therefore, Cryptographic algorithms like AES (Advanced Encryption Standard) for confidentiality and ECDSA (Elliptic Curve Digital Signature Algorithm) for Authentication are applied in the proposed algorithm to safeguard the data as well as the devices from the hackers. The following attacks such as Man-in-the-Middle, Denial -of -Service (DOS) and ARP spoofing are strongly prevented in the proposed algorithm. Thus, the implementation of an algorithm is carried out in Ubuntu Linux environment with installing Python dependencies. This algorithm affords an efficient way to thwart ARP (Address Resolution Protocol) spoofing by the hackers for IOT devices.


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1091 ◽  
Author(s):  
Thabo Semong ◽  
Thabiso Maupong ◽  
Stephen Anokye ◽  
Kefalotse Kehulakae ◽  
Setso Dimakatso ◽  
...  

In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigate these, is the use of multiple servers with a load balancer. Despite their common use, load balancers, have shown to have some disadvantages, like being vendor specific and non-programmable. To address these disadvantages and improve internet traffic, there has been a paradigm shift which resulted in the introduction of software defined networking (SDN). SDN allows for load balancers that are programmable and provides the flexibility for one to design and implement own load balancing strategies. In this survey, we highlight the key elements of SDN and OpenFlow technology and their effect on load balancing. We provide an overview of the various load balancing schemes in SDN. The overview is based on research challenges, existing solutions, and we give possible future research directions. A summary of emulators/mathematical tools commonly used in the design of intelligent load balancing SDN algorithms is provided. Finally, we outline the performance metrics used to evaluate the algorithms.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2433 ◽  
Author(s):  
Litao Han ◽  
Li Jiang ◽  
Qiaoli Kong ◽  
Ji Wang ◽  
Aiguo Zhang ◽  
...  

For existing wireless network devices and smart phones to achieve available positioning accuracy easily, fingerprint localization is widely used in indoor positioning, which depends on the differences of the Received Signal Strength Indicator (RSSI) from the Wireless Local Area Network (WLAN) in different places. Currently, most researchers pay more attention to the improvement of online positioning algorithms using RSSI values, while few focus on the MAC (media access control) addresses received from the WLAN. Accordingly, we attempt to integrate MAC addresses and RSSI values simultaneously in order to realize indoor localization within multi-story buildings. A novel approach to indoor positioning within multi-story buildings is presented in this article, which includes two steps: firstly, to identify the floor using the difference of received MAC addresses in different floors; secondly, to implement further localization on the same floor. Meanwhile, clustering operation using MAC addresses as the clustering index is introduced in the online positioning phase to improve the efficiency and accuracy of indoor positioning. Experimental results show that the proposed approach can achieve not only the precise location with the horizontal accuracy of 1.8 meters, but also the floor where the receiver is located within multi-story buildings.


2020 ◽  
Author(s):  
Noah J. Goodall

Many transportation agencies use re-identification technologies to identify vehicles at multiple points along the roadway as a way to measure travel times and congestion. Examples of these technologies include license plate readers, toll tag transponders, and media access control (MAC) address scanners for Bluetooth devices. Recent advancements have allowed for the detection of unique MAC addresses from Wi-Fi and wireless local area network (WLAN) enabled devices. This paper represents one of the first attempts to measure the fundamental characteristics of Wi-Fi re-identification technology as it applies to transportation data collection. Wi-Fi sampling rates, re-identification rates, range, transmission success rates, and probability of discovery of sensors and mobile devices were measured, and a model of probability of detection is presented. Field tests found that mobile phones routinely experienced significant time gaps between Wi-Fi transmissions. The study recommends that Wi-Fi sensors be deployed at low-volume, low-speed roadways, with sensors positioned near intersections where vehicles are likely to slow or stop. Due to Wi-Fi’s relatively low probability of discovery, the technology may produce poor results in applications that require re-identifying vehicles over multiple consecutive sensors.


Author(s):  
سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي

Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior


Sign in / Sign up

Export Citation Format

Share Document