Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
[11]   Design and Optimization of Cooperative MAC Protocol for Mobile Ad Hoc Network-Enabled Train-to-Train Communications [J].
Mu, Junjie ;
Yang, Ruizhe ;
Li, Meng ;
Si, Pengbo ;
Sun, Yang ;
Sun, Yanhua .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (05) :7278-7291
[12]   Opportunistic MAC layer design with stochastic Petri Nets for multimedia ad hoc networks [J].
Escheikh, M. ;
Barkaoui, K. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2010, 22 (10) :1308-1324
[13]   Opportunistic MAC Layer Design with Stochastic Petri Nets for Multimedia Ad Hoc Networks [J].
Escheikh, M. ;
Barkaoui, K. .
ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, :1057-1063
[14]   Improve Efficiency of Ad Hoc Networks with MIMO Communication and Cross Layer MAC Design [J].
Nasab, Ehsan Soleimani ;
Ardebilipour, Mehrdad .
11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,, 2009, :907-912
[15]   Cross layer optimization for cooperative mobile ad-hoc UAV network [J].
Li, Yan ;
Luo, Xiling .
International Journal of Digital Content Technology and its Applications, 2012, 6 (18) :367-375
[16]   MAC layer congestion control techniques in vehicular ad hoc network: survey and qualitative analysis [J].
Sharma, Swati ;
Harit, Sandeep .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (01) :17-37
[17]   A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks [J].
Raja Gunasekaran ;
Vaidheyanathan Rhymend Uthariaraj ;
Uamapathy Yamini ;
Rajagopalan Sudharsan ;
Selvaraj Sujitha Priyadarshini .
Journal of Computer Science & Technology, 2009, 24 (03) :472-481
[18]   A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks [J].
Gunasekaran, Raja ;
Uthariaraj, Vaidheyanathan Rhymend ;
Yamini, Uamapathy ;
Sudharsan, Rajagopalan ;
Priyadarshini, Selvaraj Sujitha .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, 24 (03) :472-481
[19]   Vulnerability assessment of ad hoc networks to MAC layer misbehavior [J].
Guang, Lei ;
Assi, Chadi .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (06) :703-715
[20]   A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks [J].
Raja Gunasekaran ;
Vaidheyanathan Rhymend Uthariaraj ;
Uamapathy Yamini ;
Rajagopalan Sudharsan ;
Selvaraj Sujitha Priyadarshini .
Journal of Computer Science and Technology, 2009, 24 :472-481