Open Access Open Access  Restricted Access Subscription or Fee Access

Denial of Service Attacks in Wireless Networks

Chanchal Maan, Ajay Kumar Dagar


During the past decade, the speed and reliability of communication over wireless network have been increased severely. One region of great interest in distributed system is wireless network that allows collaboration in real time. Wireless networks allow user to communicate and transfer data with each other without any wired medium between them. Denials of service attacks are really dangerous in wireless systems. This paper provides a survey of these attacks.

Full Text:



H. F. Lipson. Tracking and tracing cyber-attacks: Technical challenges and global policy issues, Special Report CMU/SEI-2002-SR-009. Pittsburg: CERT Coordination Center; 2002.

J. A. Rochlis, M. W. Eichin. With microscope and tweezers: The worm from MIT's perspective, Communications of the ACM. 1989; 32(6): 689-98p.

L. Garber. Denial-of-service attacks rip the Internet, IEEE Computer. 2000; 33(4): 12-7p.

D. J. Marchette. Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York: Springer; 2001.

C. Douligeris, A. Mitrokotsa. DDoS attacks and defense mechanisms: Classification and state-of-the-art, Computer Networks. 2004; 44(5): 643–66p.

G. Bhatti, R. Singh, P. Singh, A look back at issues in the layers of TCP/IP Model, International Journal of Enhanced Research in Management & Computer Applications. 2012; 1(2).

J. Mirkovic, S. Dietrich, D. Dittrich, P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR; 2004.

R. K. C. Chang. Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine. 2002; 40(10): 42-51p.

J. Jung, B. Krishnamurthy, M. Rabinovich. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites, In: Proceedings of the International World Wide Web Conference, May 2002; 252–62p.

G. Carl, G. Kesidis, R. Brooks, S. Rai. Denial-of-service attack detection techniques, IEEE Internet Computing. 2006; 10(1): 82-9p.


  • There are currently no refbacks.