Denial of Service (DoS) attacks are dif- flcult to prevent and protect against. In this paper we focus on DoS attacks in wireless ad hoc networks that propagate from MAC to routing layer, causing breaking of critical routes. We present several tra-c patterns that an intelligent attacker can generate to cause Denial of Service attack in one or several nodes in ad hoc networks. More speciflcally, we focus on the properties of IEEE 802.11 MAC protocol and attack propagation to the routing layer. We focus on attacks that use low-rate tra-c patterns with the goal of dis- abling one or more speciflc nodes or partitioning the network. We propose a scheme for attack detection based on modelling of MAC protocols using Extended Finite State Machines (EFSM) and present general outline for an Intrusion Detection System that has the ability to generate attack patterns and check the validity of communication patterns in the network.
[1]
Mary Baker,et al.
Mitigating routing misbehavior in mobile ad hoc networks
,
2000,
MobiCom '00.
[2]
Dharma P. Agrawal,et al.
Routing security in wireless ad hoc networks
,
2002,
IEEE Commun. Mag..
[3]
Moustafa Youssef,et al.
Analyzing the Point Coordination Function of the IEEE 802.11 WLAN Protocol using a Systems of Commun
,
2002
.
[4]
N. Vaidya,et al.
Handling MAC Layer Misbehavior in Wireless Networks
,
2002
.
[5]
Madhav V. Marathe,et al.
Analyzing interaction between network protocols, topology and traffic in wireless radio networks
,
2003,
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[6]
Michalis Faloutsos,et al.
Denial of service attacks at the MAC layer in wireless ad hoc networks
,
2002,
MILCOM 2002. Proceedings.