{"title":"无线网络拒绝服务攻击的建模与比较","authors":"Martin Eian, S. F. Mjølsnes","doi":"10.1145/2043106.2043113","DOIUrl":null,"url":null,"abstract":"Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock vulnerability in IEEE 802.11. The history of published denial of service attacks against wireless protocols indicates that formal methods can contribute to the construction of robust protocols.","PeriodicalId":219018,"journal":{"name":"Networking, Systems, and Applications for Mobile Handhelds","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"The modeling and comparison of wireless network denial of service attacks\",\"authors\":\"Martin Eian, S. F. Mjølsnes\",\"doi\":\"10.1145/2043106.2043113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock vulnerability in IEEE 802.11. The history of published denial of service attacks against wireless protocols indicates that formal methods can contribute to the construction of robust protocols.\",\"PeriodicalId\":219018,\"journal\":{\"name\":\"Networking, Systems, and Applications for Mobile Handhelds\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Networking, Systems, and Applications for Mobile Handhelds\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2043106.2043113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Networking, Systems, and Applications for Mobile Handhelds","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2043106.2043113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The modeling and comparison of wireless network denial of service attacks
Mobile handhelds with wireless access are used in numerous safety critical applications. The wireless network protocols in use are vulnerable to a wide array of denial of service attacks. We propose a formal method for modeling semantic denial of service attacks against wireless network protocols. We then use our proposed model to find a new deadlock vulnerability in IEEE 802.11. The history of published denial of service attacks against wireless protocols indicates that formal methods can contribute to the construction of robust protocols.