Skip to main content

Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Included in the following conference series:

Abstract

This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gupta, V.: Denial of service attacks at the MAC Layer in wireless Ad Hoc networks. In: Proceedings of MILCOM, vol. 2, pp. 7–10 (2002)

    Google Scholar 

  2. Zhou, Y., Wu, D., Nettles, S.M.: On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures. International Journal of Wireless and Mobile Computing 1(3/4), 268–275 (2006)

    Article  Google Scholar 

  3. Tran, T.M.C., Scheuermann, B., Mauve, M.: Detecting the presence of nodes in MANETs. In: Proc. of the ACM MOBICOM 2007, New York, USA, pp. 43–50 (2007)

    Google Scholar 

  4. Mahajan, R., Rodrig, M., Wetherall, D.: Analyzing the MAC level Behavior of Wireless Networks in the Wild. In: ACM SIGOCOM 2006, Pisa, Italy (September 2006)

    Google Scholar 

  5. Wei, R., Tenghong, L., Hai, J.: Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. Journal of Computer Research and Development 43(11), 1927–1932 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, J., Liu, H. (2011). Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics