Documente Academic
Documente Profesional
Documente Cultură
I.
INTRODUCTION
Layer
DoS attacks
Physical
Jamming, tampering
Link
Collision, exhaustion
Network
Transport
II.
PROPOSED METHODOLOGY
combination key
throughput (KB/S)
public key
2
1.5
1
0.5
0
0
5 10 15 20 25
time (s)
Node:
Sent packets:
Received packets:
Dropped packets:
Data sent:
Data received:
Data dropped:
Throughput:
Bytes/second
Good put:
Bytes/second
Lambda:
packets/second
EN:
EW:
Little's result:
-> EN:
-> EW*lambda:
Average length of:
-> Sent packets:
-> Received packets:
0
12
12
0
3.116 KB
6.504 KB
0.0 B
318.16859055194493
Node:
Sent packets:
Received packets:
Dropped packets:
Data sent:
Data received:
Data dropped:
Throughput:
Bytes/second
Good put:
Bytes/second
Lambda:
packets/second
EN:
EW:
Little's result:
-> EN:
-> EW*lambda:
Average length of:
-> Sent packets:
-> Received packets:
1
19
19
0
6.91 KB
6.91 KB
0.0 B
705.566418714358
Node:
Sent packets:
Received packets:
Dropped packets:
Data sent:
Data received:
Data dropped:
Throughput:
Bytes/second
2
14
14
0
4.2 KB
4.2 KB
0.0 B
428.85368431263436
261.3965313905581
1.225296240893241
0.0 packet(s)
0.0 second(s)
0.0
0.0
259.0 Bytes
542.0 Bytes
627.3516753373394
1.9400523814142983
0.0 packet(s)
0.0 second(s)
0.0
0.0
363.0 Bytes
363.0 Bytes
Goodput:
Bytes/second
Lambda:
packets/second
EN:
EW:
Little's result:
-> EN:
-> EW*lambda:
Average length of:
-> Sent packets:
-> Received packets:
365.95514394678133
Node:
Sent packets:
Received packets:
Dropped packets:
Data sent:
Data received:
Data dropped:
Throughput:
Goodput:
Lambda:
EN:
EW:
Little's result:
-> EN:
-> EW*lambda:
Average length of:
-> Sent packets:
-> Received packets:
3
0
0
0
0.0 B
0.0 B
0.0 B
0.0 Bytes/second
0.0 Bytes/second
0.0 packets/second
0.0 packet(s)
0.0 second(s)
IV.
1.4295122810421146
0.0 packet(s)
0.0 second(s)
0.0
0.0
300.0 Bytes
300.0 Bytes
0.0
0.0
0.0 Bytes
0.0 Bytes
CONCLUSION
REFERENCES
[1] Erik T., Martin B. T., "Practical attacks against WEP
and WPA", ACM WiSec 2009, pp. 79-85, (2009).
[2] Erik T., Ralf-Philipp W., Andrei P., "Breaking 104 Bit
WEP in Less Than 60 Seconds", Lecture Notes in Computer
Science, vol. 4867/2008, pp. 188-202, (2008).
[3] Fluhrer, S., Mantin, I., Shamir, A., "Weaknesses in the
key scheduling algorithm of RC4", LNCS, vol. 2259, pp. 1-24,
(2001).