Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Model the Flow Control Attack in Wireless Networks

Authors
Wei Wang, Wenhong Zhao
Corresponding Author
Wei Wang
Available Online July 2015.
DOI
10.2991/lemcs-15.2015.261How to use a DOI?
Keywords
System stability; Flow control attack; Confliction retransmition; Window adjustion; Network security
Abstract

To analyze the attack on mechanisms of confliction in wireless networks, a new method based on the system stability is introduced. Firstly, the theoretic basis for flow control attacks is discussed, which shows that the flow control attack may destroy data stream and network system at a low speed. Then, the procedure of flow control attack is analyzed and the basic attack method and double speed attack method is presented. At last, the efficiency of flow control attack is discussed from two aspects: link throughput and link utilization. The results show that the flow control attack may cause great harm to wireless networks.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
Series
Advances in Intelligent Systems Research
Publication Date
July 2015
ISBN
978-94-6252-102-5
ISSN
1951-6851
DOI
10.2991/lemcs-15.2015.261How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Wei Wang
AU  - Wenhong Zhao
PY  - 2015/07
DA  - 2015/07
TI  - Model the Flow Control Attack in Wireless Networks
BT  - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
PB  - Atlantis Press
SP  - 1308
EP  - 1312
SN  - 1951-6851
UR  - https://doi.org/10.2991/lemcs-15.2015.261
DO  - 10.2991/lemcs-15.2015.261
ID  - Wang2015/07
ER  -