Physical Layer Jamming Attack using Waypoint Mobility Model in WLAN

Physical Layer Jamming Attack using Waypoint Mobility Model in WLAN

Authors

  • Ahmad Yusri Dak Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Nurul Fazliana Samsudin Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Noor Elaiza Abdul Khalid Universiti Teknologi MARA Shah Alam

DOI:

https://doi.org/10.24191/jcrinn.v3i2.82

Keywords:

DoS, Physical layer, WLAN, detect

Abstract

Sharing nature of wireless medium provides various challenging features among various group of users. This is one of various services offered by Wireless Local Area Network (WLAN). In addition, due to popularity of WLANs, user experience suffer from various security threats especially jamming based Denial-of-Service (DoS) attack. The attacks are focused on radio channels where the transmission channel interfere with jamming attacks by sending high frequency signal to disturb the communication between the users in network. Most of attack exists at physical layer are detected randomly movable and less static attack are found.  Therefore, the objective of this research is to study the pattern of randomly movable node and performance of physical layer jamming attack using Waypoint Mobility Model.  To address these evaluation, a simulation model consists of constant and random jammer will be developed using OPNET. The performance involved physical layer attack that will be evaluated using three performance metrics such as Bit Error Rate (BER), Signal-to-Noise Ratio (SNR), and throughput by using Random Waypoint Point. Outcome concluded that these three-performance metrics can be shows as a significant impact to a detection mechanism that will enable offer insights and the level for future research based on DoS.

Downloads

Download data is not yet available.

Downloads

Published

2018-11-08

How to Cite

Dak, A. Y., Samsudin, N. F. ., & Abdul Khalid, N. E. . (2018). Physical Layer Jamming Attack using Waypoint Mobility Model in WLAN. Journal of Computing Research and Innovation, 3(2), 1–9. https://doi.org/10.24191/jcrinn.v3i2.82

Issue

Section

General Computing

Similar Articles

You may also start an advanced similarity search for this article.

Loading...