CFP last date
20 May 2024
Reseach Article

Investigating the Effect of Jamming Attacks on Wireless LANS

by Suresh Bandaru
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 14
Year of Publication: 2014
Authors: Suresh Bandaru
10.5120/17439-8180

Suresh Bandaru . Investigating the Effect of Jamming Attacks on Wireless LANS. International Journal of Computer Applications. 99, 14 ( August 2014), 5-9. DOI=10.5120/17439-8180

@article{ 10.5120/17439-8180,
author = { Suresh Bandaru },
title = { Investigating the Effect of Jamming Attacks on Wireless LANS },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 14 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number14/17439-8180/ },
doi = { 10.5120/17439-8180 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:10.463078+05:30
%A Suresh Bandaru
%T Investigating the Effect of Jamming Attacks on Wireless LANS
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 14
%P 5-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WLANs (Wireless local area networks) are the most widely used networks in homes as well as in commercial areas. WLANs suffer from various security threats. One of the most important attacks in denial of service (DOS) attacks are jamming attacks. As the communication in wireless networks are based on radio channels, jamming attacks interfere with the transmission channels by sending semi-valid packets (useless) in order to disturb the communication between actual nodes. The main objective of this paper is to explain frequency sweep jammer working and how it affects the performance of a network using OPNET simulation tool. For this purpose wireless networks are simulated by flooding the network with frequency sweep jammer and to determine whether switching channels can avoid jamming attack. In the simulations, initially network is configured to communicate in channel 1 and comparisons were made for network throughput and delay with and without jammer, which has demonstrated that jamming effects the performance. To avoid jamming attack communication channel is changed to 6 and the results of switching channels are explained.

References
  1. 2012. IEEE Draft Standard for IT - Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications - Amd: Enhancements for Very High Throughput for operation in bands below 6GHz. In: IEEE P802. 11ac/D2. 0, January 2012. [e- ]. pp. 1-359. Available through: IEEE,.
  2. Amit, Nagpal, Pooja Nagpal and Yashkaran Rathore. , May,2012. IJCA - Vertical
  3. Araujo, A. , 2012. Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal on wireless communications and networking, [e-journal] 2012(1), pp. 1-8. Available through: SFX, .
  4. Beg, S. , Ahsan, F. and Mohsin, S. eds. , 2010. Emerging Technologies (ICET),20106thInternational Conference on [on-line] .
  5. Buchbinder, N. , 2012. Dynamic power allocation under arbitrary varying channels: an online approach. IEEE/ACM Transactions on Networking, [e-journal] 20(2), pp. 477-487.
  6. Fu Quan, Z. , 2012. Tier-based proactive path selection mode for wireless mesh networks. (Technical report). Transactions on internet and information systems, [e-journal] 6(5), pp. 1303. Available through: SFX, .
  7. Lin, H. , 2012. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802. 11s wireless mesh networks. EURASIP Journal on wireless communications and networking, [e-journal] 2012(1), pp. 1-16. Available through: SFX, .
  8. Monteiro, T. L. , et al. , 2012. Channel allocation algorithms for WLANs using distributed optimization. AEU - International Journal of Electronics and Communications, [e-journal] 66(6), pp. 480-490. Available through: ScienceDirect, at:http://www. sciencedirect. com/science/article/pii/S1434841111002640>.
Index Terms

Computer Science
Information Sciences

Keywords

WLAN Throughput DOS OPNET Jammers Jamming Attacks.