The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


The major cause of threat circling around the wireless local area infrastructure network is Denial of Service (DoS) attack. The anticipated users will be denied from availing the resources by spoofing the Medium Access Control (MAC) address of the legitimate client/AP. Less protection in MAC address led to get easy spoofing. Since, the management frame has been unencrypted; adversary sends the management frame to the victim using the spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for a DoS attack. Many security mechanisms are obtainable which have their own drawback in providing complete prevention of DoS attack. This paper proposes ThreV mechanism which detects and prevents the intruder in an efficient manner. The solutions are simulated using NS2, to analyze how far it prevents the DoS attacks. The simulation result of the proposed algorithm measures the packet delivery ratio, control overhead, normalized routing overhead, throughput, delay and packet loss. The experimental result proved the effectiveness of proposed ThreV algorithm in detecting and preventing MAC spoof DoS attacks.

Keywords

ANM, DoS Attack, MAC Spoof, ThreV, TpatLetEn, WLANn
User