2011
DOI: 10.1002/dac.1296
|View full text |Cite
|
Sign up to set email alerts
|

A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks

Abstract: Wireless networks are deployed in many critical areas, such as health care centers, hospitals, police departments, and airports. In these areas, communication through the networks plays a vital role, and real-time connectivity along with constant availability of the networks is highly important. However, one of the most serious threats against the networks availability is the denial-of-service attacks. In wireless networks, clear text form of control frames is a security flaw that can be exploited by the attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…On the other hand, if the energy is located at zero or nearby the zero frequency point in the main lobe ω, the σ f value is smaller than LDoS attack flows. Formula (9) implies that energy at frequency points higher than zero is highlighted and the energy at frequency close to f 0 is dimmed. Here, σ f is the energy threshold, to determine the existence of LDoS attack.…”
Section: The Detection Of Ldos Attack Based On the Sedp Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, if the energy is located at zero or nearby the zero frequency point in the main lobe ω, the σ f value is smaller than LDoS attack flows. Formula (9) implies that energy at frequency points higher than zero is highlighted and the energy at frequency close to f 0 is dimmed. Here, σ f is the energy threshold, to determine the existence of LDoS attack.…”
Section: The Detection Of Ldos Attack Based On the Sedp Modelmentioning
confidence: 99%
“…Hence, the value of σ f is larger when the LDoS attack flows exist, while the value of σ f is smaller for normal TCP flows. Further analysis of the formula (9) shows that if all frequency points in the main lobe ω are taken as a sample sequence, E f /E, denoting the ratio of the energy at frequency f to the total power, is an energy distribution probability function P f with mean of 0 and variance of σ 2 . The variance σ 2 can be calculated as…”
Section: The Detection Of Ldos Attack Based On the Sedp Modelmentioning
confidence: 99%
“…Considering a case of denial of service attack that uses frame control, (Malekzadeh et al, 2012) propose a method that revokes the channel reservation asked by attacker. Sending a packet with a Request to Send (RS) too high, the AP admits that reservation and then broadcast a Clear to Send Packet (CSP) advising the channel reservation for window time requested.…”
Section: Related Workmentioning
confidence: 99%
“…Security and anonymity are two important problems in VANETs. At present, in addition to the industrial efforts on security architecture design for VANETs, many academic researches in have been conducted to address these security and privacy issues. However, many research challenges and open problems remain, in which security is one of the most significant challenges.…”
Section: Introductionmentioning
confidence: 99%