Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Investigating the Effect of Jamming Attacks on Wireless LANS

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 14
Year of Publication: 2014
Suresh Bandaru

Suresh Bandaru. Article: Investigating the Effect of Jamming Attacks on Wireless LANS. International Journal of Computer Applications 99(14):5-9, August 2014. Full text available. BibTeX

	author = {Suresh Bandaru},
	title = {Article: Investigating the Effect of Jamming Attacks on Wireless LANS},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {14},
	pages = {5-9},
	month = {August},
	note = {Full text available}


WLANs (Wireless local area networks) are the most widely used networks in homes as well as in commercial areas. WLANs suffer from various security threats. One of the most important attacks in denial of service (DOS) attacks are jamming attacks. As the communication in wireless networks are based on radio channels, jamming attacks interfere with the transmission channels by sending semi-valid packets (useless) in order to disturb the communication between actual nodes. The main objective of this paper is to explain frequency sweep jammer working and how it affects the performance of a network using OPNET simulation tool. For this purpose wireless networks are simulated by flooding the network with frequency sweep jammer and to determine whether switching channels can avoid jamming attack. In the simulations, initially network is configured to communicate in channel 1 and comparisons were made for network throughput and delay with and without jammer, which has demonstrated that jamming effects the performance. To avoid jamming attack communication channel is changed to 6 and the results of switching channels are explained.


  • 2012. IEEE Draft Standard for IT - Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications - Amd: Enhancements for Very High Throughput for operation in bands below 6GHz. In: IEEE P802. 11ac/D2. 0, January 2012. [e- ]. pp. 1-359. Available through: IEEE,.
  • 802. 11 WLAN Model [on-line] Available at:
  • Cisco Live 365 Presentations : Cisco Live!™ 2010 - 2011 - 2012 Conference Session, Speaker and Exhibitor Presentations [on-line] Available at:
  • Amit, Nagpal, Pooja Nagpal and Yashkaran Rathore. , May,2012. IJCA - Vertical
  • Araujo, A. , 2012. Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal on wireless communications and networking, [e-journal] 2012(1), pp. 1-8. Available through: SFX, .
  • Beg, S. , Ahsan, F. and Mohsin, S. eds. , 2010. Emerging Technologies (ICET),20106thInternational Conference on [on-line] .
  • Buchbinder, N. , 2012. Dynamic power allocation under arbitrary varying channels: an online approach. IEEE/ACM Transactions on Networking, [e-journal] 20(2), pp. 477-487.
  • Fu Quan, Z. , 2012. Tier-based proactive path selection mode for wireless mesh networks. (Technical report). Transactions on internet and information systems, [e-journal] 6(5), pp. 1303. Available through: SFX, .
  • Lin, H. , 2012. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802. 11s wireless mesh networks. EURASIP Journal on wireless communications and networking, [e-journal] 2012(1), pp. 1-16. Available through: SFX, .
  • Monteiro, T. L. , et al. , 2012. Channel allocation algorithms for WLANs using distributed optimization. AEU - International Journal of Electronics and Communications, [e-journal] 66(6), pp. 480-490. Available through: ScienceDirect, at:http://www. sciencedirect. com/science/article/pii/S1434841111002640>.
  • Kim, S. , Kim, D. and Suh, Y. , 2012. A group-based channel assignment protocol for rate separation in IEEE 802. 11-based multi-radio multi-rate ad hoc networks. Ad Hoc Networks, [e-journal] 10(1), pp. 95-110. Available through: ScienceDirect, at: .
  • Yang, F. , Y, Xiao, J. , Luan, P. ,L and Pend, L. , June 2011. Research on Detection Scheme for Denial of Service Attacks in Wireless Mesh Networks| Whitepapers | TechRepublic [e-journal] 5(6)(9/9/2012), pp. 290-296. Available through: RefGrab-It, at:
  • Zhao, W. and Xie, J. , 2011. OPNET-based modeling and simulation study on handoffs in Internet-based infrastructure wireless mesh networks. Computer Networks, [e-journal] 55(12), pp. 2675-2688. Available through: ScienceDirect, at: .