Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
|
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [11] An efficient layered security framework for protecting network layer operations in mobile ad hoc networks
    Jaisankar, N.
    Saravanan, R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2010, 5 (03) : 295 - 307
  • [12] A Dynamic-Bandwidth-Allocation-with-Collision-Avoidance MAC Design for Mobile Ad hoc Network
    Jiang, Zaihan
    Zhou, MengChu
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 18 - 23
  • [13] Eliminating Selective Dropping Attack in Mobile Ad Hoc Network
    Mahdi Bounouni
    Louiza Bouallouche-Medjkoune
    Abderrahmane Beraza
    Adel Daoud
    Wireless Personal Communications, 2022, 123 : 3291 - 3308
  • [14] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [15] Eliminating Selective Dropping Attack in Mobile Ad Hoc Network
    Bounouni, Mahdi
    Bouallouche-Medjkoune, Louiza
    Beraza, Abderrahmane
    Daoud, Adel
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (04) : 3291 - 3308
  • [16] Defense mechanisms against Sybil attack in vehicular ad hoc network
    Mohammadi, Mahdiyeh Ali
    Pouyan, Ali A.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 917 - 936
  • [17] Study on Key Techniques of Aeronautical Ad Hoc Network MAC and Network Layer
    Qiu, Qiming
    Fang, Zheng
    Gong, Cheng
    2014 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON AEROSPACE TECHNOLOGY, APISAT2014, 2015, 99 : 280 - 291
  • [18] Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol
    Duraipandian, M.
    Palanisamy, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 245 - 257
  • [19] A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks
    Arunmozhi, S. A.
    Venkataramani, Y.
    ADVANCED COMPUTING, PT III, 2011, 133 : 210 - 216
  • [20] Design of a Joint Defense System for Mobile Ad Hoc Networks
    Ferng, Huei-Wen
    Liu, Chien-Liang
    2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 742 - 746