2 June 2005 Resist DoS attacks in UMTS-WLAN
Author Affiliations +
Wireless network is more vulnerable to denial of service (DoS) attacks than wired one. In this paper we propose two methods to resist DoS attacks in UMTS-WLAN network, one is active and the other is passive. These two are complementary to each other. In active DoS defense method, a mobile terminal generates an authorized anonymous ID (AAI) using its true ID such as IP address, MAC address, PIN code, or asymmetric key, and substitutes its true ID with the authorized anonymous ID. The mobile terminal may be authenticated by the UMTS-WLAN, however its true ID is anonymous to intending attackers. This method can be used to isolate de-authenticating/disassociating DoS attackers, spoofing power-save DoS attacker, etc. In passive DoS defense method, we propose a trace back scheme. We use covert channels in the header of mobile IP packets to trace back the malicious nodes by embedding some address information of intermediate nodes, and recovering the embedded information by the victim. After the victim successfully traces the attacking paths from malicious nodes, it can segregate the malicious nodes and protect itself. This method can be used to resist DoS attacks of mass-produced junk message congestions.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Huyu Qu, Huyu Qu, Qiang Cheng, Qiang Cheng, } "Resist DoS attacks in UMTS-WLAN", Proc. SPIE 5819, Digital Wireless Communications VII and Space Communication Technologies, (2 June 2005); doi: 10.1117/12.604513; https://doi.org/10.1117/12.604513


Internet-based secure virtual networks
Proceedings of SPIE (September 15 1998)
Using overlays to improve network security
Proceedings of SPIE (July 07 2002)
Firewall systems: the next generation
Proceedings of SPIE (January 02 1996)
Mobile gateway techniques
Proceedings of SPIE (August 28 2001)

Back to Top