Learn More
This paper describes a trivial, but highly effective denial of service attack bawd on commonly available IEEE 802.11 hardware andfi-eely available sofnare. The attack requires limited resources and is inexpensive to mount. This paper will discus the attack, its implementation, and provide an analysis of methods to achieve optimal denial of service results.(More)
  • 1