Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/HICSS.2012.517guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control

Published: 04 January 2012 Publication History

Abstract

Wireless network security is a daunting challenge as researchers analyze the vulnerabilities of wireless medium access control schemes such as IEEE 802.11, Bluetooth, and IEEE 802.16. While these wireless protocols employ traditional contention and non-contention approaches, recent work has identified the delay and throughput performance advantages of a flow-specific medium access hybrid solution for wireless networks such as the traffic-adaptive Cooperative Wireless Sensor Medium Access Control (CWS-MAC) protocol. Accordingly, this paper addresses the security of wireless networks employing these hybrid, flow-specific schemes by analyzing the vulnerabilities in traffic-adaptive CWS-MAC, many of which are applicable to hybrid medium access schemes in general. Critical vulnerabilities are identified that expose the protocol to denial of service, energy exhaustion and "greedy" attacks. The effect of attacks exploiting these vulnerabilities are shown to include decreased throughput and increased delay in both the contention and non-contention modes as well as increased per node energy consumption.

Index Terms

  1. Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      HICSS '12: Proceedings of the 2012 45th Hawaii International Conference on System Sciences
      January 2012
      5600 pages
      ISBN:9780769545257

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 04 January 2012

      Author Tags

      1. Security
      2. medium access
      3. wireless

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 18 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media