LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Fragkiadakis, A.G.; Askoxylakis, Ioannis; Chatziadam, P. (2014)
Languages: English
Types: Unknown
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordable cost. However, the broadband nature of the wireless medium make these networks vulnerable to a number of attacks. Malicious interference at the physical layer, and extended packet collisions at the medium access layer can cause significant DoS attacks. In this work, we show how off-the-shelf hardware can be used to create devastating DoS attacks in a IEEE 802.11 network. Moreover, we present two algorithms for attack detection that are based on the cumulative sum algorithm. © 2014 Springer International Publishing Switzerland.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. N. Bartzoudis, A. Fragkiadakis, D. Parish, J. Luis-Nunez, and M. Sandford, \Recon gurable computing and active networks," in Engineering of Recon gurable Systems and Algorithms, 2003, pp. 280{283.
    • 2. C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker, \Composing softwarede ned networks," in Proc. of the NSDI, 2013, pp. 87{98.
    • 3. K. Markantonakis, K. Mayes, D. Sauveron, and I. Askoxylakis, \Overview of security threats for smart cards in the public transport industry," in Proc. of the ICEBE, 2008, pp. 506{513.
    • 4. \Sesp jammers, http://www.sesp.com."
    • 5. \Mobile device jammer, http://www.phonejammer.com/home.php."
    • 6. \Software-de ned radios, http://www.ettus.com/home."
    • 7. \Linux wireless drivers, ath5k, http://linuxwireless.org/en/users/Drivers/ath5k."
    • 8. E. Tragos, A. Fragkiadakis, I. Askoxylakis, and V. Siris, \The impact of interference on the performance of a multi-path metropolitan wireless mesh network," in Proc. of ISCC, 2011, pp. 199{204.
    • 9. V. Angelakis, S. Papadakis, V. Siris, and A. Traganitis, \Channel Interference in 802.11a is harmful. Testbed validation of a simple quanti cation model," IEEE Communications Magazine, pp. 160{166, 2011.
    • 10. M. Natkaniec and A. Pach, \An analysis of the backo mechanism used in ieee 802.11 networks," in Proc. of ISCC, 2000, pp. 444{449.
    • 11. A. Fragkiadakis, E. Tragos, and I. Askoxylakis, \Video streaming performance in wireless hostile environments," in Proc. of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011, pp. 267{272.
    • 12. G. Berger-Sabbatel, A. Duda, M. Heusse, and F. Rousseau, \Short-term fairness of 802.11 networks with several hosts," in Proc. of the IFIP, 2004, pp. 263{274.
    • 13. R. Jain, The Art of Computer Systems Performance Analysis. John Wiley & Sons, 1991.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article