Abstract
This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gupta, V.: Denial of service attacks at the MAC Layer in wireless Ad Hoc networks. In: Proceedings of MILCOM, vol. 2, pp. 7–10 (2002)
Zhou, Y., Wu, D., Nettles, S.M.: On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures. International Journal of Wireless and Mobile Computing 1(3/4), 268–275 (2006)
Tran, T.M.C., Scheuermann, B., Mauve, M.: Detecting the presence of nodes in MANETs. In: Proc. of the ACM MOBICOM 2007, New York, USA, pp. 43–50 (2007)
Mahajan, R., Rodrig, M., Wetherall, D.: Analyzing the MAC level Behavior of Wireless Networks in the Wild. In: ACM SIGOCOM 2006, Pisa, Italy (September 2006)
Wei, R., Tenghong, L., Hai, J.: Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. Journal of Computer Research and Development 43(11), 1927–1932 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Su, J., Liu, H. (2011). Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-23214-5_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23213-8
Online ISBN: 978-3-642-23214-5
eBook Packages: Computer ScienceComputer Science (R0)