DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Link-level measurements from an 802.11b mesh network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Architecture and evaluation of an unplanned 802.11b mesh network
Proceedings of the 11th annual international conference on Mobile computing and networking
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Feasibility study of mesh networks for all-wireless offices
Proceedings of the 4th international conference on Mobile systems, applications and services
Channel surfing: defending wireless sensor networks from jamming and interference
Proceedings of the 4th international conference on Embedded networked sensor systems
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A measurement-based approach to modeling link capacity in 802.11-based wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Impact of Routing Metrics on Path Capacity in Multirate and Multihop Wireless Ad Hoc Networks
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Proceedings of the second ACM conference on Wireless network security
OLSR performance measurement in a military mobile ad hoc network
Ad Hoc Networks
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Evaluating the communication performance of an ad hoc wireless network
IEEE Transactions on Wireless Communications
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Wireless mesh networks (WMNs) are considered as cost effective, easily deployable and capable of extending Internet connectivity. However, one of the major challenges in deploying reliable WMNs is preventing their nodes from malicious attacks, which is of particular concern as attacks can severely degrade network performance. When a DoS attack is targeted over an entire communication path, it is called a path-based DoS attack. We study the performance impact of path-based DoS attacks by considering attack intensity, medium errors, physical diversity, collusion and hop count. We setup a wireless mesh testbed and configure a set of experiments to gather realistic measurements, and assess the effects of different factors. We find that medium errors have significant impact on the performance of WMNs when a path-based DoS attack is carried out, and the impact is exacerbated by the MAC layer retransmissions. We show that due to physical diversity, a far attacker can lead to an increased performance degradation than a close-by attacker. Additionally, we demonstrate that the joint impact of two colluding attackers is not as severe as the joint result of individual attacks. We also discuss a strategy to counter path-based DoS attacks which can potentially alleviate the impact of the attack significantly.