DoS attacks and defense mechanisms in wireless networks

L. A. Mohammed, B. Issac

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Wireless networks is one of the fastest growing technologies. Here the users only need to have a mobile device with a wireless network adapter that negotiates with an access point or base station. Once authenticated and associated, the user can freely move around within the coverage area of the access point without losing data or network connection. On the negative side, these networks tend to have fuzzy boundaries, making it easy for an intruder to capture these transmission signals and also send massive volume of illegitimate traffic and utilize system resources in a way that renders the system inoperable thus denying access to authorized users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving denial of service (DoS) attacks as it applies to wireless networks and discusses and proposes different defense mechanisms so as to minimize the attacks.

Original languageEnglish
Title of host publicationIEE Mobility Conference 2005 - Second International Conference on Mobile Technology, Applications and Systems
PublisherIET
ISBN (Print)9810545711
DOIs
Publication statusPublished - 1 Dec 2005
Externally publishedYes
EventIEE Mobility Conference 2005 - The Second International Conference on Mobile Technology, Applications and Systems - Guangzhou, China
Duration: 15 Nov 200517 Nov 2005

Conference

ConferenceIEE Mobility Conference 2005 - The Second International Conference on Mobile Technology, Applications and Systems
Country/TerritoryChina
CityGuangzhou
Period15/11/0517/11/05

Keywords

  • Defense mechanism
  • DoS attack
  • Wireless networks vulnerabilities

Fingerprint

Dive into the research topics of 'DoS attacks and defense mechanisms in wireless networks'. Together they form a unique fingerprint.

Cite this