Detailed DoS attacks in wireless networks and countermeasures

被引:9
|
作者
Mohammed, Lawan A. [1 ]
Issac, Biju [1 ]
机构
[1] Swinburne Univ Technol Sarawak, Informat Secur Res Lab, Kuching 93576, Malaysia
关键词
DoS attacks; countermeasures; wireless network vulnerabilities;
D O I
10.1504/IJAHUC.2007.012417
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [21] A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks
    Lee, Joon-Ku
    Choi, You-Rak
    Suh, Beom-Kyu
    Jung, Sang-Woo
    Kim, Ki-Il
    APPLIED SCIENCES-BASEL, 2025, 15 (04):
  • [22] Distributed actuation attacks in wireless sensor networks: Implications and countermeasures
    Czarlinska, Alexandra
    Kundur, Deepa
    DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, 2006, : 3 - +
  • [23] Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks
    Gavric, Zeljko
    Simic, Dejan
    INGENIERIA E INVESTIGACION, 2018, 38 (01): : 130 - 138
  • [24] A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
    Mohi, Maryam
    Movaghar, Ali
    Zadeh, Pooya Moradian
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 507 - 511
  • [25] Regional-based Authentication Against DoS Attacks in Wireless Networks
    Martinovic, Ivan
    Zdarsky, Frank A.
    Schmitt, Jens B.
    Q2SWINET'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON Q2S AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2007, : 176 - 179
  • [26] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [27] Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
    Al-issa, Abdulaziz, I
    Al-Akhras, Mousa
    ALsahli, Mohammed S.
    Alawairdhi, Mohammed
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 107 - 112
  • [28] On the detection of signaling DoS attacks on 3G wireless networks
    Lee, Patrick P. C.
    Bu, Tian
    Woo, Thomas
    INFOCOM 2007, VOLS 1-5, 2007, : 1289 - +
  • [29] A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks
    Meghdadi, Majid
    Ozdemir, Suat
    Gueler, Inan
    IETE TECHNICAL REVIEW, 2011, 28 (02) : 89 - 102
  • [30] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941