메뉴 건너뛰기




Volumn , Issue , 2009, Pages 14-21

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard

Author keywords

[No Author keywords available]

Indexed keywords

DOS ATTACKS; IEEE 802.11S; INFORMATION ELEMENTS; NETWORK COMMUNICATIONS; NETWORK INTERFACE CARDS; OPERATING SYSTEMS; SECURITY WEAKNESS; WI-FI - TECHNOLOGY;

EID: 77951273497     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2009.5355149     Document Type: Conference Paper
Times cited : (29)

References (35)
  • 1
    • 77951281566 scopus 로고    scopus 로고
    • Online. Available
    • Cisco, "German hospital leads with 802.11n mobility," 2009. [Online]. Available: http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ ps6973/case-study c36-522101.pdf
    • (2009) German Hospital Leads with 802.11n Mobility
  • 3
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Revised Papers from the Springer-Verlag, [Online]. Available
    • S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," in Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography. Springer-Verlag, 2001, pp. 1-24. [Online]. Available: http://portal.acm.org/citation.cfm?id=646557. 694759
    • (2001) 8th Annual International Workshop on Selected Areas in Cryptography , pp. 1-24
    • Fluhrer, S.R.1    Mantin, I.2    Shamir, A.3
  • 9
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Urbana-Champaign, IL, USA: ACM, [Online]. Available
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. Urbana-Champaign, IL, USA: ACM, 2005, pp. 46-57. [Online]. Available: http://portal.acm.org/citation.cfm?id=1062689.1062697
    • (2005) Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 12
    • 4544326203 scopus 로고    scopus 로고
    • A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs
    • C. Wullems, K. Tham, J. Smith, and M. Looi, "A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs," in Wireless Telecommunications Symposium, 2004, pp. 129-136.
    • Wireless Telecommunications Symposium, 2004 , pp. 129-136
    • Wullems, C.1    Tham, K.2    Smith, J.3    Looi, M.4
  • 13
    • 36949015142 scopus 로고    scopus 로고
    • Understanding and mitigating the impact of RF interference on 802.11 networks
    • R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," SIGCOMM Comput. Commun. Rev., vol.37, no.4, pp. 385-396, 2007.
    • (2007) SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.4 , pp. 385-396
    • Gummadi, R.1    Wetherall, D.2    Greenstein, B.3    Seshan, S.4
  • 15
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX, 2003, pp. 15-28.
    • Proc. USENIX, 2003 , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 19
    • 51949113065 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • D. J. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in Proc. MILCOM, October 2006.
    • Proc. MILCOM, October 2006
    • Thuente, D.J.1    Acharya, M.2
  • 22
    • 34247489321 scopus 로고    scopus 로고
    • Vulnerability assessment of ad hoc networks to MAC layer misbehavior
    • DOI 10.1002/wcm.391
    • L. Guang and C. Assi, "Vulnerability assessment of ad hoc networks to MAC layer misbehavior," Wireless Communications and Mobile Computing, vol.7, no.6, pp. 703-715, 2007. (Pubitemid 47265059)
    • (2007) Wireless Communications and Mobile Computing , vol.7 , Issue.6 , pp. 703-715
    • Guang, L.1    Assi, C.2
  • 25
    • 77951292864 scopus 로고    scopus 로고
    • High speed risks in 802.11n networks
    • ARUBA Networks, [Online]. Available
    • J. Wright, "High speed risks in 802.11n networks," in RSA Conference. ARUBA Networks, 2008. [Online]. Available: http://www. willhackforsushi.com/presentations/rsa2008-wright.pdf
    • (2008) RSA Conference
    • Wright, J.1
  • 29
    • 38849204787 scopus 로고    scopus 로고
    • Discovering and exploiting 802.11 wireless driver vulnerabilities
    • L. Butti and J. Tinnés, "Discovering and exploiting 802.11 wireless driver vulnerabilities," Journal in Computer Virology, vol.4, no.1, pp. 25-37, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 25-37
    • Butti, L.1    Tinnés, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.