Processor design for portable systems
Journal of VLSI Signal Processing Systems - Special issue on technologies for wireless computing
The simulation and evaluation of dynamic voltage scaling algorithms
ISLPED '98 Proceedings of the 1998 international symposium on Low power electronics and design
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
IEEE Network: The Magazine of Global Internetworking
Attack trace generation of cryptographic protocols based on coloured Petri nets model
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Network survivability is fundamental to information security. Adversaries could compromise network functionality by attacking the physical layer, the Medium Access Control (MAC) layer or the network layer. Even though security mechanisms for the network layer have been extensively discussed, MAC layer security has not been deeply explored. Leveraging security flaws in the IEEE 802.11 MAC protocol and the salient features of a Mobile Ad Hoc Network (MANET), even an average person with limited knowledge of wireless networks can launch MAC-layer Denial of Service (DOS) attacks. In this paper, we study two types of MAC layer DOS attacks that can be easily employed by an average person: attacks launched from a single adversary by injecting enormous data flows into the network and attacks launched from two colluding adversaries by sending enormous data flows directly to each other. To counter the first attacks, we propose a packet-by-packet authentication scheme so that legitimate nodes can reject data transmission requests from unauthenticated adversaries. To mitigate the second attacks, we propose several counter measures such as a fair MAC protocol, using protecting traffic flows and distance adjustment. The contribution of this paper is that it reveals the attacks that could be launched by an average person, which is a potential threat to MANETs.