Application access control at network level
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Defending wireless infrastructure against the challenge of DDoS attacks
Mobile Networks and Applications
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
IEEE/ACM Transactions on Networking (TON)
A practical method to counteract denial of service attacks
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
IEEE Transactions on Dependable and Secure Computing
Bluetooth Worms: Models, Dynamics, and Defense Implications
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Mitigating attacks on open functionality in SMS-capable cellular networks
IEEE/ACM Transactions on Networking (TON)
A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
SBAC: Service Based Access Control
ICECCS '09 Proceedings of the 2009 14th IEEE International Conference on Engineering of Complex Computer Systems
Hi-index | 0.00 |
The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, we propose a security architecture for counteracting denial of service attacks in wireless based network architecture with mobile nodes. We describe the system model and discuss the different cases of attack scenarios involving the mobility of the attacking and victim nodes. We describe how mobile IP protocol in conjunction with our model can be used to deal efficiently with the attacks on mobile nodes.