2008 16th IEEE International Conference on Networks 2008
DOI: 10.1109/icon.2008.4772600
|View full text |Cite
|
Sign up to set email alerts
|

A cross layer attack against MANET cooperation enforcement tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…If the attacker uses a small CW value, it can preempt the channel and prevent others from accessing the channel with a high probability [2]. Cross-layer attacks in other types of wireless networks have been reported in the literature [15][16][17][18][19][20]. Some of these cross-layer attacks achieve similar goals as the attack described in this paper, but because of the nature of these networks, they do not have to consider the effect of the spectrum.…”
Section: Related Work 21 Security Attacks In Crsmentioning
confidence: 83%
See 2 more Smart Citations
“…If the attacker uses a small CW value, it can preempt the channel and prevent others from accessing the channel with a high probability [2]. Cross-layer attacks in other types of wireless networks have been reported in the literature [15][16][17][18][19][20]. Some of these cross-layer attacks achieve similar goals as the attack described in this paper, but because of the nature of these networks, they do not have to consider the effect of the spectrum.…”
Section: Related Work 21 Security Attacks In Crsmentioning
confidence: 83%
“…From the graph, a higher connectivity is observed with the set of PRPs that are prime. For example consider PRP numbers set1, (2,3,5,7,11,13,17). All of them are prime numbers.…”
Section: Figure 6 Key Connectivity With Different Set Of Rpn Numbersmentioning
confidence: 99%
See 1 more Smart Citation
“…The earlier works on design of cross-layer security solutions were presented in [41]- [44]. In [41], author contend that a foe can together utilize impact on connection layer, parcel dropping and disarray on the network layer to performance out a Denial of Service (DoS) attack.…”
Section: Cross Layer Security Methodsmentioning
confidence: 99%
“…Vincent Toubiana et al [6] introduced a type of cross-layer attack that is usually applied against MANET cooperation enforcement tools. This kind of attack depends on CSMA/CA model with an intention of leaking information about the possible easy targets.…”
Section: Cross-layer Attack Against the Manet Co-operation Enforcemenmentioning
confidence: 99%