Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Denial of Service in Sensor Networks
Computer
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
Wireless mesh network security: A traffic engineering management approach
Journal of Network and Computer Applications
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Controlling data dissemination
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Hi-index | 0.00 |
In mobile ad hoc networks (MANETs), Denial of Service (DoS) attacks not only consume the scarce system resources, such as bandwidth, battery energy, or CPU cycles, but also isolate legitimate users from a network. Therefore, DoS attacks may impact the network connectivity seriously and may further undermine the networking functions, such as control and data message delivery. In this paper, we will present a deep insight into DoS attacks and their impacts on MANETs. First, we analyze the node isolation problem resulting from DoS attacks and derive the probability of node isolation, which shows that the DoS attack exploiting fraudulent routing messages, such as BlackHole attack, impacts the connectivity much severer than other attacks. Second, we notice that the node mobility and potential attack propagation have hardly been considered in the previous DoS attack studies; therefore, we introduce a dynamic DoS attack in this paper. The dynamic DoS attack is characterized in exploiting the node mobility, dynamic power control, and compromised nodes to spread new DoS attacks dynamically. Further, we provide an analytical study on the properties of this new DoS attack, and explain its potential devastating impact on the connectivity of MANETs.