Nytro Posted January 27, 2015 Report Posted January 27, 2015 Denial of Service Attacks in WirelessNetworksBUSINESS NEED FOR SECURITYDenial of Service Attacks in WirelessNetworksByMallikarjun HangargiGraduate StudentMaster of Science in Information AssuranceNortheastern UniversityTable of ContentsI. Introduction……………………………………………………………………………………………………………………1II. Jamming (intentional interference) & unintentional interference at the Physical layer….2III. Intentional DoS at the Media Access Control (MAC) layer like Masquerading attacks andResource exhaustion attack……………………………………………………………………………………………7A. Lack of management and control frame protection………………………………………………....7i. Resource Exhaustion attack………………………………………………………………………………….8ii. De-authentication Flooding attack……………………………………………………………………..10iii. Disassociation Flooding attack……………………………………………………………………………12IV. Conclusion……………………………………………………………………………………………………………………14V. Reference…………………………………………………………………………………………………………………….15Download: http://packetstorm.foofus.com/papers/wireless/DoS_attacks_in_wireless_networks.pdf Quote