Vulnerability of IEEE802.11 WLANs to MAC layer DoS attacks

Author(s):  
P. Nobles ◽  
P.A. Horrocks
Keyword(s):  
2018 ◽  
Author(s):  
Kiramat

—Cooperative networking brings performance improvement to most of theissues in wireless networks, such as fading or delay due to slow stations. However, due tocooperation when data is relayed via other nodes, there network is more prone to attacks.Since, channel access is very important for cooperation, most of the attacks happens at MAC.One of the most critical attack is denial of service, which is reason of cooperation failure.Therefore, the cooperative network as well as simple wireless LAN must be defensive againstDOS attacks.In this article we analyzed all possible of DoS attacks that can happen at MAC layer ofWLAN. The cooperative protocols must consider defense against these attacks. This articlealso provided survey of available solutions to these attacks. At the end it described itsdamages and cost as well as how to handle these attacks while devising cooperative MAC.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4954 ◽  
Author(s):  
Adnan Shahid Khan ◽  
Kuhanraj Balan ◽  
Yasir Javed ◽  
Seleviawati Tarmizi ◽  
Johari Abdullah

Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the efficiency of traffic flow. Due to its open wireless boundary and high mobility, VANET is vulnerable to malicious nodes that could gain access into the network and carry out serious medium access control (MAC) layer threats, such as denial of service (DoS) attacks, data modification attacks, impersonation attacks, Sybil attacks, and replay attacks. This could affect the network security and privacy, causing harm to the information exchange within the network by genuine nodes and increase fatal impacts on the road. Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. A series of experiment has been conducted using the Veins simulation tool to assess the performance of the proposed solution in the terms of packet delivery ratio (PDR), end-to-end delay, packet loss, transmission overhead, and computational cost.


2012 ◽  
Vol 35 (3) ◽  
pp. 529-539 ◽  
Author(s):  
Yun-Lu LIU ◽  
Ju-Hua PU ◽  
Wei-Wei FANG ◽  
Zhang XIONG

2013 ◽  
Vol 26 (2) ◽  
pp. 144-149
Author(s):  
Wei Sun ◽  
Jianping Wang ◽  
Qiyue Li ◽  
Zituo Qian ◽  
Chongwei Zhang

Sign in / Sign up

Export Citation Format

Share Document