2008 Fourth Advanced International Conference on Telecommunications 2008
DOI: 10.1109/aict.2008.54
|View full text |Cite
|
Sign up to set email alerts
|

Rogue Access Point Based DoS Attacks against 802.11 WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…The arrival rate of attacking frames to the RX queue λ 3 The arrival rate of data frames to the TX2 queue D…”
Section: Queuing Model Of the Wlanmentioning
confidence: 99%
See 3 more Smart Citations
“…The arrival rate of attacking frames to the RX queue λ 3 The arrival rate of data frames to the TX2 queue D…”
Section: Queuing Model Of the Wlanmentioning
confidence: 99%
“…The normal TCP RTT without DoS attacks X 2 The average number of data frames at TX2 during a ML attack or a HL attack t 1 The duration for the wireless STA to process a data frame t 2 The duration for AP_Air RX to process a data frame t 3 The duration for AP_CPU to process a data frame t 4 The duration for the wired STA to process a data frame t 5 The duration for AP_Air TX to process a data frame µ…”
Section: Queuing Model Of the Wlanmentioning
confidence: 99%
See 2 more Smart Citations
“…The disassociation DoS attack leaves the target in the authenticated state. Thus, the work performed by the target to undo the attack's effect is more in case of deauthentication DoS attack as compared with disassociation DoS attack . The attack frames are sent successively so that the target receives another forged frame before it finishes fresh authentication and association (Figure ).…”
Section: Dos Attacks In Ieee 80211imentioning
confidence: 99%