Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
[21]   Cross-layer design for data accessibility in mobile ad hoc networks [J].
Chen, K ;
Shah, SH ;
Nahrstedt, K .
WIRELESS PERSONAL COMMUNICATIONS, 2002, 21 (01) :49-76
[22]   Cross-layer design for cooperative caching in mobile ad hoc networks [J].
Denko, Mieso K. ;
Tian, Jun .
2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, :375-380
[23]   Cross-Layer Design for Data Accessibility in Mobile Ad Hoc Networks [J].
Kai Chen ;
Samarth H. Shah ;
Klara Nahrstedt .
Wireless Personal Communications, 2002, 21 :49-76
[24]   Preventing Denial of Service (DoS) attacks in mobile ad hoc networks [J].
Denko, MK .
ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, :269-274
[25]   Curbing and Curing Sybil attack in Ad hoc Network [J].
Palanisamy, V. ;
Annadurai, P. ;
Vijilakshmi, S. .
FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, :1-+
[26]   Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks [J].
Tamilselvan, Latha ;
Sankaranarayanan, V. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03) :118-123
[27]   SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS [J].
Sharma, Sheenu ;
Gupta, Roopam .
JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2009, 4 (02) :243-250
[28]   A QoS MAC protocol for differentiated service in mobile ad hoc networks [J].
Yeh, CH ;
You, TT .
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2003, :349-356
[29]   A New Channel Hopping MAC Protocol for Mobile Ad Hoc Networks [J].
Chao, Chih-Min ;
Tsai, Hsien-Chen ;
Huang, Kuan-Ju .
2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, :1319-1323
[30]   An efficient MAC protocol for cooperative diversity in mobile ad hoc networks [J].
Islam, Md. Rajibul ;
Hamouda, Walaa .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (06) :771-782