IEEE International Conference on Communications, 2005. ICC 2005. 2005
DOI: 10.1109/icc.2005.1495094
|View full text |Cite
|
Sign up to set email alerts
|

DoS analysis of reservation based MAC protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Analyzing the DoS impact on specific parts of the networking infrastructure, e.g., base station and a core network server functionality, can also identify the bottleneck vulnerabilities of the service provider infrastructure. Furthermore, there can be other threat impact metrics, including the wireless channel/mediumaccess-control resources (between the user and the base station) [8,[17][18][19]23], host-based networking resources (similar to a TCP SYN Flood attacking the server connection table) [7,15,18,25], and the power resource (especially useful if considering a flying base station to provide emergency networking or futuregeneration networking with greater device/rate requirements for connectivity services) [10,12,13].…”
Section: Future Work and Potential Countermeasure Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Analyzing the DoS impact on specific parts of the networking infrastructure, e.g., base station and a core network server functionality, can also identify the bottleneck vulnerabilities of the service provider infrastructure. Furthermore, there can be other threat impact metrics, including the wireless channel/mediumaccess-control resources (between the user and the base station) [8,[17][18][19]23], host-based networking resources (similar to a TCP SYN Flood attacking the server connection table) [7,15,18,25], and the power resource (especially useful if considering a flying base station to provide emergency networking or futuregeneration networking with greater device/rate requirements for connectivity services) [10,12,13].…”
Section: Future Work and Potential Countermeasure Discussionmentioning
confidence: 99%
“…In wireless and mobile security, previous research studied the control communication injection threats targeting the victim's availability. These research studies defended against DoS threats based on jamming the control communication channel itself because the control communication channel is publicly known [6,9,16], injecting false information on the wireless-channel-setting medium access control (MAC) communications for DoS [8,19], and injecting false information on the MAC feedback [23]. While our threat can classify as false/bogus control communication injection (more specifically, false requests for the initial channel requests), our work focuses on the emerging 5G networking as opposed to the more general wireless networking.…”
Section: Related Workmentioning
confidence: 99%
“…The research efforts on the topic of wireless MAC security have, so far, remained limited to addressing the concomitant threats in isolation. For instance, from the existing literature, studies undertaken so far focus on following issues: Denial of Service (DoS) attacks to jam the system [24], [25], [26], [27], [28], [29]; transmitting bogus requests to the reserve channels [30], [31], [32], [33]; falsifying information at the communication feedback point(s) [34]; sleeping-based MAC [35], [36], [37], [38] that is vulnerable especially in case an attacker knows the MAC layer information [39]; and This section presents a literature review that comprises of three main subsections: the first subsection explains security schemes in FANETs, the second subsection describes security schemes at MAC layer, and the third subsection presents access control and key-agreement schemes.…”
Section: B Security Schemes At Medium Access Control Layermentioning
confidence: 99%
“…However, the model does not specify prevention of DoS attacks based on the contention-free control frames. The NAV validation schemes have also been discussed in [8,9]. DoS attack detection schemes have been proposed in [10][11][12]; however, they are only capable in detecting the attacks and not in preventing them.…”
Section: Related Workmentioning
confidence: 99%