Skip to Main Content
Using the model of finite state machine, this paper describes the operation process of the IEEE 802.11 MAC protocol in wireless self-organizing networks as the process of state transfer. Based on the finite state machine and the support vector machine, an attack detection model in MAC layer is proposed. Moreover, in this model, how the attacker avoid successfully being detected and make the attack for different operating state of MAC protocol are studied. The simulation with NS-2.33 shows that the average throughput of the network decreases gradually as attacks are strengthened, while the consumption of the route increases gradually.
Future Computer and Communication (ICFCC), 2010 2nd International Conference on (Volume:3 )
Date of Conference: 21-24 May 2010