2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering 2013
DOI: 10.1109/icprime.2013.6496483
|View full text |Cite
|
Sign up to set email alerts
|

Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The authors have analysed both sender and receiver misbe-haviours and concludes that misbehaving nodes can obtain a larger throughput which significantly affect the network performance, even capable of completely freeze the network at higher rate attacks. In [4] they have analysed and simulated the RTS/CTS DoS attack variants in 802.11 networks, which is one type of low rate DoS attack that capable to exploit the medium reservation mechanism of IEEE 802.11 through duration field. Also, in [5] [6] [7] has conducted an evaluation for greedy receiver misbehaviour in IEEE 802.11 Hotspots, they have identified a range of greedy receiver misbehaviours, and quantify their damage using both simulation and testbed experiments.…”
Section: B Ieee 80211 Mac Protocol Misbehavioursmentioning
confidence: 99%
“…The authors have analysed both sender and receiver misbe-haviours and concludes that misbehaving nodes can obtain a larger throughput which significantly affect the network performance, even capable of completely freeze the network at higher rate attacks. In [4] they have analysed and simulated the RTS/CTS DoS attack variants in 802.11 networks, which is one type of low rate DoS attack that capable to exploit the medium reservation mechanism of IEEE 802.11 through duration field. Also, in [5] [6] [7] has conducted an evaluation for greedy receiver misbehaviour in IEEE 802.11 Hotspots, they have identified a range of greedy receiver misbehaviours, and quantify their damage using both simulation and testbed experiments.…”
Section: B Ieee 80211 Mac Protocol Misbehavioursmentioning
confidence: 99%
“…In [4] the authors have analysed and simulated the RTS/CTS DoS attack variants in 802.11 networks which is one type of low rate DoS attack that capable to exploit the medium reservation mechanism of IEEE 802.11 networks through duration field. Their research proposing a RTS/CTS attack which changes the Network Allocation Vector(NAV) value in RTS/CTS control packet.…”
Section: Related Workmentioning
confidence: 99%
“…Their research proposing a RTS/CTS attack which changes the Network Allocation Vector(NAV) value in RTS/CTS control packet. The attacker could set the maximum value for the NAV duration field, and if the attacker uses a data rate of 30 frames/s then the attacker can prevent genuine nodes from accessing the channel [4]. The research done by P. Kyasanaur et al [6] have proposed a modification to the existing standard IEEE 802.11 MAC protocol in order to address the problem of sender backoff manipulation in WLANs.…”
Section: Related Workmentioning
confidence: 99%
“…DoS attack is in which an attacker trying to make the target server stop providing services. It exists in many areas and has many attacking modes such as Anti_DoS [1] , 802.11 Network DoS [2] , Mobile ad-hoc DoS [3] and VANET DoS [4] . The attacker can make two effects to the server by launching DoS attack.…”
Section: Introductionmentioning
confidence: 99%