Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
|
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [1] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 233 - +
  • [2] Multichannel MAC Layer in Mobile Ad-Hoc Network
    Logesh, K.
    Rao, Samba Siva
    INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 77 - +
  • [3] Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks
    Michalas, Antonis
    Komninos, Nikos
    Prasad, Neeli R.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2011, 3 (01) : 14 - 36
  • [4] Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks
    Marimuthu, Mohanapriya
    Krishnamurthi, Ilango
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 31 - 37
  • [5] A Survey on Network Layer Attacks and AODV Defense in Mobile Ad hoc Networks
    Saeed, Amna
    Raza, Asad
    Abbas, Haider
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 185 - 191
  • [6] Mitigating Dynamic DoS Attacks in Mobile Ad Hoc Network
    Joshi, Bhavin
    Singh, Nikhil Kumar
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [7] SCSR: A novel MAC protocol for mobile ad hoc network
    Fan Jun
    Li Zhitang
    Wang Li
    Chen Yuan
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 931 - 934
  • [8] Effect of MAC layer protocol in building trust and reputation scheme in Mobile ad hoc network
    Diwanji, Hiteishi
    Shah, J. S.
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [9] MAC protocol for mobile ad hoc network with smart antennas
    Yang, J
    Li, HD
    Sheng, M
    ELECTRONICS LETTERS, 2003, 39 (06) : 555 - 557
  • [10] Improvement of MAC Protocol Based on Mobile Ad hoc Network
    Qin Jun
    Zong Ping
    Zhang Jianping
    ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING, PTS 1-3, 2011, 271-273 : 1009 - +