Denial of service attack in wireless data network: A survey
Wireless networks is one of the dominant technology trends in this digital era. Due to the broadcast nature of wireless network, wireless air interface is open and accessible to all types of users, which turned to be a numerous unique challenges on their security to researchers. While the set of cha...
Saved in:
Published in | 2017 Devices for Integrated Circuit (DevIC) pp. 354 - 359 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Wireless networks is one of the dominant technology trends in this digital era. Due to the broadcast nature of wireless network, wireless air interface is open and accessible to all types of users, which turned to be a numerous unique challenges on their security to researchers. While the set of challenges in wireless networks are diverse, we focus on Denial of service attack in Wireless Network in this paper. Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against Wireless Network security. First, we propose effects of DoS attack on Wireless Network. Further, various DoS attacks on different layers of TCP are proposed. |
---|---|
AbstractList | Wireless networks is one of the dominant technology trends in this digital era. Due to the broadcast nature of wireless network, wireless air interface is open and accessible to all types of users, which turned to be a numerous unique challenges on their security to researchers. While the set of challenges in wireless networks are diverse, we focus on Denial of service attack in Wireless Network in this paper. Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against Wireless Network security. First, we propose effects of DoS attack on Wireless Network. Further, various DoS attacks on different layers of TCP are proposed. |
Author | Deva Sarma, Hiren Kumar Singh, Rahul Sourav Prasad, Ajay Moven, Roselina Maria |
Author_xml | – sequence: 1 givenname: Rahul Sourav surname: Singh fullname: Singh, Rahul Sourav email: rss2016@outlook.com organization: Dept. of IT, Sikkim Manipal University Sikkim, India – sequence: 2 givenname: Ajay surname: Prasad fullname: Prasad, Ajay email: ajay.prsd1@gmail.com organization: Dept. of IT, Sikkim Manipal University Sikkim, India – sequence: 3 givenname: Roselina Maria surname: Moven fullname: Moven, Roselina Maria email: rosemoven.rm@gmail.com organization: Dept. of CSE, University of Engineering and Management, Jaipur – sequence: 4 givenname: Hiren Kumar surname: Deva Sarma fullname: Deva Sarma, Hiren Kumar email: hirenkdsarma@gmail.com organization: Dept. of IT, Sikkim Manipal Institute of Technology, Sikkim |
BookMark | eNotz7tOwzAUgGEjwQClLwCLXyDhHLvxBaYqbaFSJZaKtfLlWLIaEuSEVn17Bjr92yf9D-y2H3pi7AmhRgT7slp_bdtaAOragJZWmRs2t9pgAxYWWizUPXtbUZ9dx4fERyqnHIi7aXLhyHPPz7lQR-PIo5sc72k6D-X4ypd8_C0nujyyu-S6kebXzth-s963H9Xu833bLndVtjBVPmDUkFAoraKPSjU2gDTSe4fovSRpdQKRSDWRUNpGgIgkUIMxCl2QM_b8z2YiOvyU_O3K5XA9kn8JCEQs |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/DEVIC.2017.8073968 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509047246 1509047247 |
EndPage | 359 |
ExternalDocumentID | 8073968 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-bc1d70f12676dbd6659c0383bba11bb3e397f02fe65de1395202de21708861ac3 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:27:09 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-bc1d70f12676dbd6659c0383bba11bb3e397f02fe65de1395202de21708861ac3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_8073968 |
PublicationCentury | 2000 |
PublicationDate | 2017-March |
PublicationDateYYYYMMDD | 2017-03-01 |
PublicationDate_xml | – month: 03 year: 2017 text: 2017-March |
PublicationDecade | 2010 |
PublicationTitle | 2017 Devices for Integrated Circuit (DevIC) |
PublicationTitleAbbrev | DEVIC |
PublicationYear | 2017 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7101032 |
Snippet | Wireless networks is one of the dominant technology trends in this digital era. Due to the broadcast nature of wireless network, wireless air interface is open... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 354 |
SubjectTerms | Availability Computer crime Denial of Service (DoS) IP networks Jamming OFDM Protocols Security TCP model Wireless networks |
Title | Denial of service attack in wireless data network: A survey |
URI | https://ieeexplore.ieee.org/document/8073968 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7anjyptOKbHDy62013k93qSfpAhYqHKr2VPGahtGyl3RX01zvZbSuKB29JCORFMvMl3zcBuDJGhkqp2KlxrBelnHvKIGVNIhJrBNkcJ3AePcn7l-hxIiY1uN5pYRCxJJ-h75LlW75dmsJdlbUT96wkkzrUCbhVWq2tDibotvuD14eeI2vF_qbijx9TSoMx3IfRtqmKJzL3i1z75vNXFMb_9uUAWt_SPPa8MzqHUMOsCbd9R5lbsGXK1tXeZyrPlZmzWcZcMOIFnWfMkUFZVtG-b9gdWxerd_xowXg4GPfuvc2vCN6sG-SeNtzGQco7MpZWWylF1wQEM7VWnGsdIjkYadBJUQqL5N7RbHcsEvCg40RyZcIjaGTLDI-BhWkkQqGMTFREKE2qUEkCGLQpE_IbMTiBphv39K2KezHdDPn07-Iz2HNzX_GzzqGRrwq8IIOd68typb4ACOSWtQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JTwIxFH5BPOhJDRh3e_DoDLO1M6MnwxJQIB7QcCPdJiGQwcCMif56X2cAo_HgrW2adEv7vdd-3yvAjZTM55yHRo2jrCBxXYtLjVkZ0UhJiphjBM6DIeu-BI9jOq7A7VYLo7UuyGfaNsniLV8tZG6uyhqReVZi0Q7sIu5Tr1RrbZQwTtxotV97TUPXCu111R9_phSQ0TmAwaaxkikys_NM2PLzVxzG__bmEOrf4jzyvIWdI6jotAb3LUOam5NFQlbl7ic8y7ickWlKTDjiOZ5oxNBBSVoSv-_IA1nly3f9UYdRpz1qdq31vwjWNHYyS0hXhU7ieixkSijGaCwddDSF4K4rhK_RxEgcL9GMKo0GHs63pzS6HnigMJdL_xiq6SLVJ0D8JKA-5ZJFPEA_jXGfM3QxcFtGaDlq5xRqZtyTtzLyxWQ95LO_i69hrzsa9Cf93vDpHPbNOpRsrQuoZstcXyJ8Z-KqWLUvG72Z_w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+Devices+for+Integrated+Circuit+%28DevIC%29&rft.atitle=Denial+of+service+attack+in+wireless+data+network%3A+A+survey&rft.au=Singh%2C+Rahul+Sourav&rft.au=Prasad%2C+Ajay&rft.au=Moven%2C+Roselina+Maria&rft.au=Deva+Sarma%2C+Hiren+Kumar&rft.date=2017-03-01&rft.pub=IEEE&rft.spage=354&rft.epage=359&rft_id=info:doi/10.1109%2FDEVIC.2017.8073968&rft.externalDocID=8073968 |