An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
a variety of locations. This has lead to development of high level security protocols for WLAN. The newest protocol IEEE 802.11i ratified to provide strong data encryption but it can not prevent Denial of Service (DoS) attacks on WLAN. This paper in a testbed, conducts an experimental framework to i...
| Main Authors: | Malekzadeh, Mina, Abdul Ghani, Abdul Azim, Desa, Jalil, Subramaniam, Shamala |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/13031/ http://psasir.upm.edu.my/id/eprint/13031/1/An%20experimental%20evaluation%20of%20DoS%20attack%20and%20its%20impact%20on%20throughput%20of%20IEEE%20802.pdf |
Similar Items
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
An enhanced A-MSDU frame aggretation scheme for 802.11n wireless networks
by: Saif, Anwar, et al.
Published: (2012)
by: Saif, Anwar, et al.
Published: (2012)
Two level aggregation scheme with optimization in subframes headers for IEEE 802.11n wireless networks
by: Noma, Adamu Muhammad
Published: (2014)
by: Noma, Adamu Muhammad
Published: (2014)
Efficient back-off mechanism for multimedia support in IEEE 802.11E
by: Al-Nuaimi, Aws Ali Shakir
Published: (2012)
by: Al-Nuaimi, Aws Ali Shakir
Published: (2012)
Performance evaluation of different transport layer protocols on the IEEE 802.11 and IEEE 802.15.4 MAC/PHY layers for WSN
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
by: Oad, Aneel
Published: (2013)
by: Oad, Aneel
Published: (2013)
Rated window method and packet size differentiation scheme for TCP fairness in IEEE 802.11 WLAN
by: Rasul, Tareq
Published: (2011)
by: Rasul, Tareq
Published: (2011)
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
by: Sadeghi, Mohammad Mehdi Gilanian
Published: (2015)
by: Sadeghi, Mohammad Mehdi Gilanian
Published: (2015)
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
by: Liew, Jiun Terng
Published: (2019)
by: Liew, Jiun Terng
Published: (2019)
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
by: Ng, Roger Cheng Yong
Published: (2006)
by: Ng, Roger Cheng Yong
Published: (2006)
Technique for privacy preserving real-time vehicle tracking using 802.11p technology
by: Singh, Jaipal
Published: (2011)
by: Singh, Jaipal
Published: (2011)
Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN: A Step towards Cross-Layer Design
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
by: Al-Mekhlafi, Mohamed Abdulkarem Taher
Published: (2021)
by: Al-Mekhlafi, Mohamed Abdulkarem Taher
Published: (2021)
Priority Enabled Transport Layer Protocol for Wireless Sensor Network
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
Mitigating hidden node problem in an IEEE 802.16 failure resilient multi-hop wireless backhaul
by: Chai, Pey San Nancy
Published: (2011)
by: Chai, Pey San Nancy
Published: (2011)
Optimized scheme for fast mobile IPV6 handover and mobility in IEEE 802.16 network
by: Seyyedoshohadaei, Seyyed Masoud
Published: (2013)
by: Seyyedoshohadaei, Seyyed Masoud
Published: (2013)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
LCART: Lightweight Congestion Aware Reliable Transport Protocol for WSN Targeting Heterogeneous Traffic
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Design and implementation of a lightweight security model to prevent IEEE 802.11 wireless DoS attacks.
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
Enhancements on hybrid coordination function controlled channel access for video transmission in IEEE 802.11E network
by: Mohammed Al-Maqri, Mohammed Ahmed
Published: (2016)
by: Mohammed Al-Maqri, Mohammed Ahmed
Published: (2016)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
WLAN IEEE 802.11b performance measurement and handover mechanism / Abdulmukti Ahmad
by: Ahmad, Abdulmukti
Published: (2007)
by: Ahmad, Abdulmukti
Published: (2007)
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
by: Qasem, Yaaqob Ali Ahmed
Published: (2010)
by: Qasem, Yaaqob Ali Ahmed
Published: (2010)
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Optimal channel assignment for multi-hop wimax mesh networks
by: Haleem, Ahmed Shain
Published: (2016)
by: Haleem, Ahmed Shain
Published: (2016)
Enhanced algorithm for energy-saving mechanism and frame response time reduction in IEEE 802.16e WiMAX
by: Baker, Alaa M.
Published: (2010)
by: Baker, Alaa M.
Published: (2010)
Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j
by: Singh, Ashish, et al.
Published: (2010)
by: Singh, Ashish, et al.
Published: (2010)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2010)
by: Malekzadeh, Mina, et al.
Published: (2010)
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)
by: Al-Alak, Saif M. Kh.
Published: (2014)
Similar Items
-
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007) -
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011) -
An enhanced A-MSDU frame aggretation scheme for 802.11n wireless networks
by: Saif, Anwar, et al.
Published: (2012) -
Two level aggregation scheme with optimization in subframes headers for IEEE 802.11n wireless networks
by: Noma, Adamu Muhammad
Published: (2014) -
Efficient back-off mechanism for multimedia support in IEEE 802.11E
by: Al-Nuaimi, Aws Ali Shakir
Published: (2012)