Real Time Detection of MAC Layer DoS Attacks in IEEE 802.11 Wireless Networks

被引:0
|
作者
Dasari, Mallesham [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
关键词
IEEE 802.11 Wireless Networks; Denial of Service Attacks; MAC Layer Attacks; Change Point Detection; OF-SERVICE ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a real time detection of Medium Access Control (MAC) layer attacks in IEEE 802.11 wireless networks is proposed. There can be different kinds of Denial of Service (DoS) attacks observed at the MAC layer such as misbehaviour and selfish attacks. The malicious nodes manipulate the MAC protocol parameters such as back-off time, network allocation vector value and short inter frame space, or flood the network with huge volume of dummy packets. With this, the attacker nodes capture entire network bandwidth causing legitimate nodes not communicate with other nodes, consequently decreasing the throughput of the nodes significantly. This paper gives an effective real time detection of these attacks with minimal detection delay. We collect the delay and throughput data and apply a change point detection algorithm to observe the change of distribution. To observe the effect of these attacks, two types of attacks: back-off manipulation and RTS flooding are simulated using Network Simulator (NS-3). The simulation results shows the efficiency of the detection algorithm in terms of delay and throughput results.
引用
收藏
页码:939 / 944
页数:6
相关论文
共 50 条
  • [1] Reliable MAC layer multicast in IEEE 802.11 wireless networks
    Sun, MT
    Huang, LF
    Wang, S
    Arora, A
    Lai, TH
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2003, 3 (04): : 439 - 453
  • [2] MAC Layer Handoff Algorithm for IEEE 802.11 Wireless Networks
    Khan, Rizwan
    Aissa, Sonia
    Despins, Charles
    [J]. ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 686 - 691
  • [3] Reliable MAC layer multicast in IEEE 802.11 wireless networks
    Sun, MT
    Huang, LF
    Arora, A
    Lai, TH
    [J]. 2002 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDING, 2002, : 527 - 536
  • [4] Tuning of IEEE 802.11 MAC for Improving Real-Time in Industrial Wireless Networks
    Seno, Lucia
    Vitturi, Stefano
    Tramarin, Federico
    [J]. 2012 IEEE 17TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2012,
  • [5] Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks
    Tang, Jin
    Cheng, Yu
    Hao, Yong
    Zhou, Chi
    [J]. 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [6] A cross-layer optimization of IEEE 802.11 MAC for wireless multihop networks
    Hwang, June
    Kim, Seong-Lyun
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (07) : 531 - 533
  • [7] Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks
    Sethuraman, Sibi Chakkaravarthy
    Dhamodaran, Sangeetha
    Vijayakumar, Vaidehi
    [J]. IET NETWORKS, 2019, 8 (04) : 219 - 232
  • [8] Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
    Li, Hongjian
    Xu, Ming
    Li, Yi
    [J]. ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2007, 4847 : 382 - +
  • [9] MAC-layer support for real-time video over IEEE 802.11 DCF networks
    Kim, JO
    Tode, H
    Murakami, K
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (04) : 1382 - 1391
  • [10] A Cross-Layer SCTP Scheme With Redundant Detection for Real-Time Transmissions in IEEE 802.11 Wireless Networks
    Lai, Wei Kuang
    Jhan, Jyun-Jie
    Li, Jian-Wen
    [J]. IEEE ACCESS, 2019, 7 : 114086 - 114101