Simulation and analysis of RTS/CTS DoS attack variants in 802.11 networks
暂无分享,去创建一个
V. A. Kumar | P. M. D. Nagarjun | C. A. Kumar | A. Ravi | V. A. Kumar | C. Kumar | P. Nagarjun | A. Ravi
[1] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[2] Alan Colvin. CSMA with collision avoidance , 1983, Comput. Commun..
[3] K Sugantha,et al. A Statistical Approach to detect NAV Attack at MAC layer , 2005 .
[4] Qi Chen,et al. Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.
[5] Tao Liu,et al. LDoS attack in ad-hoc network , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[6] Lili Qiu,et al. Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[7] Vallipuram Muthukkumarasamy,et al. Denial of Service Attacks Against 802.11 DCF , 2006 .
[8] Weifeng Chen,et al. Flow level detection and filtering of low-rate DDoS , 2012, Comput. Networks.
[9] Pramod K. Varshney,et al. Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming , 2003 .
[10] J. J. Garcia-Luna-Aceves,et al. Solutions to hidden terminal problems in wireless networks , 1997, SIGCOMM '97.
[11] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.