Detailed DoS attacks in wireless networks and countermeasures

Lawan A. Mohammed, Biju Issac

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.

Original languageEnglish
Pages (from-to)157-166
Number of pages10
JournalInternational Journal of Ad Hoc and Ubiquitous Computing
Volume2
Issue number3
Early online date12 Feb 2007
DOIs
Publication statusPublished - 18 May 2007

Keywords

  • Countermeasures
  • DoS attacks
  • Vulnerabilities
  • Wireless network

Fingerprint

Dive into the research topics of 'Detailed DoS attacks in wireless networks and countermeasures'. Together they form a unique fingerprint.

Cite this