Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
|
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
  • [21] Adaptive segmented path protecting mechanism in mobile ad hoc network
    Wang R.-Y.
    Wu D.-P.
    Wu M.-Q.
    Zhen Y.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2011, 33 (07): : 1617 - 1622
  • [22] PROTECTING PACKETS AGAINST MALICIOUS NODES IN MOBILE AD HOC NETWORK
    Devi
    Jayakumar
    IIOAB JOURNAL, 2016, 7 (09) : 64 - 68
  • [23] An interference avoidance MAC protocol design in mobile ad hoc networks
    Chen, Ching-Wen
    Weng, Chuan-Chi
    Chen, Po-Yueh
    COMPUTER NETWORKS, 2012, 56 (11) : 2614 - 2634
  • [24] An Enhanced Power Saving Mechanism in Ad Hoc Network at MAC Layer
    Jiang, Shaoping
    Tang, Shaoxian
    Liao, Yueqi
    Li, Wang
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, PT I, 2011, 152 : 134 - 141
  • [25] Mitigating the Misbehavior of Nodes at MAC layer in Wireless Ad Hoc Network
    Devipriya, M.
    Mala, C.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 771 - 774
  • [26] Neighbor Discovery in Mobile Ad Hoc Networks Using an Abstract MAC Layer
    Cornejo, Alejandro
    Lynch, Nancy
    Viqar, Saira
    Welch, Jennifer L.
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 1460 - +
  • [27] Analysis and Simulation of MAC Layer Misbehavior in Mobile Ad-Hoc Networks
    Houssaini, Mohammed-Alamine Ei
    Aaroud, Abdessadek
    El Hore, Ali
    Ben-Othman, Jalel
    2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), 2014, : 50 - 54
  • [28] A reliable and efficient MAC layer broadcast protocol for mobile ad hoc networks
    Chiu, Chun-Yuan
    Wu, Eric Hsiao-Kuang
    Chen, Gen-Huey
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (04) : 2296 - 2305
  • [29] Cross-layer design for packet fast forward in mobile ad hoc network
    Tan Wei
    Qin Dan-yang
    Sha Xue-jun
    Xu Yubin
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 848 - 851
  • [30] FD-MAC: A Flow-Driven MAC Protocol for Mobile Ad Hoc Networks
    Wang, Hai
    Tan, Shiying
    Zheng, Jun
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2902 - +