Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

被引:0
作者
Su, Jian [1 ]
Liu, Huining [2 ]
机构
[1] Guangxi Sci & Technol Project Evaluat Ctr, Nanning 530022, Peoples R China
[2] Guangxi Sci & Technol Dept, Nanning 530012, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I | 2010年
关键词
Ad Hoc Networks; MAC Layer; DoS attack; Protecting Flow;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
引用
收藏
页码:143 / 146
页数:4
相关论文
共 50 条
[41]   The analysis of power-controlled mac layer for wireless ad hoc networks [J].
Inaltekin, H ;
Haas, ZJ .
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, :1406-1411
[42]   MAC layer performance analysis of multi-hop ad hoc networks [J].
Alizadeh-Shabdiz, F ;
Subramaniam, S .
GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, :2781-2785
[43]   On the MAC layer performance of time-hopped UWB ad hoc networks [J].
Broustis, Ioannis ;
Vlavianos, Angelos ;
Krishnamurthy, Srikanth V. .
ICCCN 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2006, :103-+
[44]   A routing protocol for mobile terminals in an ad hoc network with established network [J].
Yoshida, Masashi ;
Miki, Tetsuya .
ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 2007, 90 (10) :47-56
[45]   Cross layer design for ad-hoc networks [J].
Pham, P ;
Perreau, S ;
Jayasuriya, A .
ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 :81-104
[46]   A new network layer for mobile ad hoc wireless networks based on Assignment Router Identity Protocol [J].
Peng, Chaorong ;
Chen, Chang Wen .
PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, :786-791
[47]   An intelligent hybrid spread spectrum MAC for interference management in mobile ad hoc networks [J].
Ajmal, Sana ;
Jabeen, Samra ;
Rasheed, Asim ;
Hasan, Aamir .
COMPUTER COMMUNICATIONS, 2015, 72 :116-129
[48]   A MAC protocol for the mixed scenario of omnidirectional and directional nodes in an ad hoc network [J].
Alam, Md. Nasre ;
Hussain, Md. Asdaque ;
Khan, Pervez ;
Kim, Baek-Hyun ;
Kwak, Kyung Sup .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) :3720-3737
[49]   A New Recommendation Trusted Model for Mobile Ad hoc Network [J].
Chi Yaping ;
Hu Ronglei ;
Fang Yong ;
Li Ran .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[50]   Hierarchical multicast routing scheme for mobile ad hoc network [J].
Nargunam, A. Shajin ;
Sebastian, M. P. .
HIGH PERFORMANCE COMPUTING - HIPC 2007, PROCEEDINGS, 2007, 4873 :464-+