Title of article :
DoS detection in IEEE 802.11 with the presence of hidden nodes
Author/Authors :
Soryal, Joseph City University of New York - City College of New York - Electrical Engineering Department, USA , Liu, Xijie City University of New York - City College of New York - Electrical Engineering Department, USA , Saadawi, Tarek City University of New York - City College of New York - Electrical Engineering Department, USA
From page :
415
To page :
422
Abstract :
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard.Attacker nodes alter the IEEE802.11DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that followthe protocol standards.Weobtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi, and Liu and Saadawi to determine the channel capacity. We validated the results obtained via the theoretical computationswith the results obtained byOPNET simulator to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area.All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
Keywords :
Network security , Wireless networks , IEEE 802.11 , Markov Chain , Network mapping
Journal title :
Journal of Advanced Research
Journal title :
Journal of Advanced Research
Record number :
2646320
Link To Document :
بازگشت