“…At the 802.11 MAC layer [6], a replay attack [2,7,8] can be done by intercepting a valid signed mes-sages of MN (the validation is assured by the timestamp concept) and by retransmitting them later in order to produce a DoS attack. At the network layer, a DoS attacker makes the use of the existing protocols vulnerabilities, that can be classified further into three types: routing disruption, forwarding disruption and resource consumption attacks [4,9,10]. At the application layer, a random DoS attack [11] is to flood a network with a large number of service requests.…”