MILCOM 2005 - 2005 IEEE Military Communications Conference
DOI: 10.1109/milcom.2005.1606009
|View full text |Cite
|
Sign up to set email alerts
|

Increasing the DOS Attack Resiliency in Military Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…At the 802.11 MAC layer [6], a replay attack [2,7,8] can be done by intercepting a valid signed mes-sages of MN (the validation is assured by the timestamp concept) and by retransmitting them later in order to produce a DoS attack. At the network layer, a DoS attacker makes the use of the existing protocols vulnerabilities, that can be classified further into three types: routing disruption, forwarding disruption and resource consumption attacks [4,9,10]. At the application layer, a random DoS attack [11] is to flood a network with a large number of service requests.…”
Section: Introductionmentioning
confidence: 99%
“…At the 802.11 MAC layer [6], a replay attack [2,7,8] can be done by intercepting a valid signed mes-sages of MN (the validation is assured by the timestamp concept) and by retransmitting them later in order to produce a DoS attack. At the network layer, a DoS attacker makes the use of the existing protocols vulnerabilities, that can be classified further into three types: routing disruption, forwarding disruption and resource consumption attacks [4,9,10]. At the application layer, a random DoS attack [11] is to flood a network with a large number of service requests.…”
Section: Introductionmentioning
confidence: 99%