A Statistical Approach to detect NAV Attack at MAC layer

نویسنده

  • K. Sugantha
چکیده

This paper proposes and investigates a statistical approach to detect the NAV attack in MAC layer. We present simulation and analytical results showing that the NAV attack can under perform the standard 802.11 MAC protocol. Further no approach has been explicitly specified to detect this attack. This approach is a simpler method to detect NAV attack using Glomosim simulator. In this work we investigate the vulnerabilities and detect the NAV attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Probabilistic NAV to Increase Fairness in Ad HOC 802.11 MAC Layer

The IEEE 802.11 MAC layer is known for its low performances in wireless ad hoc networks. For instance, it has been shown in the literature that two independent emitters nodes can easily monopolize the medium, preventing other nodes to send packets. The protocol we introduce in this article is a simple variation of the original IEEE 802.1 1 MAC layer which significantly increases the fairness wh...

متن کامل

Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks

Denial-of-Service (DoS) attacks pose a major threat to the availability of wireless ad hoc networks. Fault tolerant operation of wireless ad hoc networks will depend on the placement of DoS countermeasures in sufficiently robust form. In this paper, we describe a novel type of DoS attack called the Stasis Trap attack, and propose a technique for detecting such an attack. Stasis Trap attack has ...

متن کامل

A hybrid data mining anomaly detection technique in ad hoc networks

Ad hoc network security mainly relies on defence mechanisms at each mobile node due to lack of infrastructure. For this reason, various intrusion detection techniques have been proposed for ad hoc networks. Developing Intrusion Detection Systems (IDS) for individual nodes in ad hoc network is challenging for a number of reasons, including resource constraints at each node and the difficulties t...

متن کامل

Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks

Media access control (MAC) address spoofing results in the theft of sensitive information and misuse of network resources. This paper demonstrates an anomaly-based intrusion detection approach, which incorporates radio frequency fingerprinting (RFF) and Hotelling’s T , a multivariate statistical process control technique, for detecting this attack. RFF is a technique used to uniquely identify a...

متن کامل

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simult...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005