메뉴 건너뛰기




Volumn , Issue , 2013, Pages 258-263

Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks

Author keywords

802.11 MAC Layer; Low rate Denial of Service attacks; RTS CTS attack

Indexed keywords

802.11 MAC; 802.11 NETWORKS; DENIAL OF SERVICE ATTACKS; NS-2 SIMULATIONS; RESERVATION MECHANISM; RTS/CTS; SIMULATION AND ANALYSIS; TEST BED ENVIRONMENT;

EID: 84876750865     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPRIME.2013.6496483     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 0020831766 scopus 로고
    • CSMA with collision avoidance
    • Oct.
    • A. Colvin, "CSMA with collision avoidance," Computer Communications, vol. 6, no. 5, pp. 227-35, Oct. 1983.
    • (1983) Computer Communications , vol.6 , Issue.5 , pp. 227-35
    • Colvin, A.1
  • 2
    • 0030609296 scopus 로고    scopus 로고
    • Solutions to hidden terminal problems in wireless networks
    • Sept.
    • Chane L Fullmer and JJ Garcia-Luna-Aceves, "Solutions to hidden terminal problems in wireless networks," ACM SIGCOMM, vol. 27, no. 4, pp. 39-49, Sept. 1997.
    • (1997) ACM SIGCOMM , vol.27 , Issue.4 , pp. 39-49
    • Fullmer, C.L.1    Garcia-Luna-Aceves, J.J.2
  • 3
    • 0037003792 scopus 로고    scopus 로고
    • Denial of Service attacks at the MAC layer in wireless ad hoc networks
    • Oct.
    • V. Gupta, S. Krishnamurthy and M. Faloutsos, "Denial of Service attacks at the MAC layer in wireless ad hoc networks," MILCOM 2002, vol. 2, pp. 1118-1123, Oct. 2002.
    • (2002) MILCOM 2002 , vol.2 , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 4
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted Denial of Service attacks (The Shrew vs. The Mice and Elephants)
    • Aug.
    • A. Kuzmanovic and E. Knightly, "Low-rate TCP-targeted Denial of Service attacks (The Shrew vs. The Mice and Elephants)," ACM SIGCOMM 03, pp. 75-86, Aug. 2003.
    • (2003) ACM SIGCOMM 03 , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.2
  • 5
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
    • Aug.
    • J. Bellardo and S. Savage, "802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions," 12th USENIX Security Symposium, Washington D.C., USA, vol. 12, pp. 2-2, Aug. 2003.
    • (2003) 12th USENIX Security Symposium, Washington D.C., USA , vol.12 , pp. 2-2
    • Bellardo, J.1    Savage, S.2
  • 6
    • 79955055383 scopus 로고    scopus 로고
    • Protecting wireless networks against a Denial of Service attack based on Virtual jamming
    • CA, USA, Sept. , unpublished.
    • Dazhi Chen, Jing Deng and K. Varshney Pramod, "Protecting wireless networks against a Denial of Service attack based on Virtual jamming," MobiCom 2003, CA, USA, Sept. 2003, unpublished.
    • (2003) MobiCom 2003
    • Chen, D.1    Deng, J.2    Varshney Pramod, K.3
  • 8
    • 84876770676 scopus 로고    scopus 로고
    • Matthew Gast, 802.11 Wireless Networks The Definitive Guide, 2nd ed., O'Reilly Media, 2005
    • Matthew Gast, 802.11 Wireless Networks The Definitive Guide, 2nd ed., O'Reilly Media, 2005.
  • 11
    • 64849109814 scopus 로고    scopus 로고
    • LDoS attack in ad-hoc network
    • Feb.
    • Yanxiang He, Yi Han, Qiang Cao, Tao Liu and Libing Wu, "LDoS attack in ad-hoc network," WONS 2009, pp. 251-257, Feb. 2009.
    • (2009) WONS 2009 , pp. 251-257
    • He, Y.1    Han, Y.2    Cao, Q.3    Liu, T.4    Wu, L.5
  • 12
    • 78149444755 scopus 로고    scopus 로고
    • Greedy receivers in IEEE 802.11 Hotspots: Impacts and detection
    • Mi Kyung Han and Lili Qiu, "Greedy receivers in IEEE 802.11 Hotspots: impacts and detection," Dependable and Secure Computing, vol. 7, pp. 410-423, 2010.
    • (2010) Dependable and Secure Computing , vol.7 , pp. 410-423
    • Kyung Han, M.1    Qiu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.