2018
DOI: 10.1002/dac.3580
|View full text |Cite
|
Sign up to set email alerts
|

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network

Abstract: Summary Wireless mesh networks (WMNs) have acquired recently enormous attention and momentum; therefore, security aspects have been a fundamental concern for them. Among catastrophic threats on WMNs, Denial‐of‐Service attacks that have become a severe danger because of their plug‐and‐play structural design. Unfortunately, preventing a Denial‐of‐Service attack presents a challenging issue. This fact is induced with the appearance of the source IP addresses spoofing. The resolution key of this issue is to reveal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Therefore, we can realize a theoretical probabilistic comparison which is sufficient since the ITrace method is old. Then, the second Traceback solution is the OBTA, which is a new Deterministic Packet Marking scheme [19]. Moreover, we will compare our proposed approach with OBTA throughout simulations results.…”
Section: Performance Analysis By Resorting To Some Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, we can realize a theoretical probabilistic comparison which is sufficient since the ITrace method is old. Then, the second Traceback solution is the OBTA, which is a new Deterministic Packet Marking scheme [19]. Moreover, we will compare our proposed approach with OBTA throughout simulations results.…”
Section: Performance Analysis By Resorting To Some Related Workmentioning
confidence: 99%
“…The ITrace method proposed by Thing et al [19] produces a message with forwarding or backwarding link permitting to determine 2 routers in an attack path. Moreover, another message with both links is produced to allow the victim to determine 3 routers in an attack path.…”
mentioning
confidence: 99%