2020
DOI: 10.1088/1742-6596/1530/1/012009
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Network Behaviour during Jamming Attacks: Simulation using OPNET

Abstract: Jamming-style attacks can be launched easily on wireless networks because they are built upon a shared medium. These attacks can be performed by emitting radio frequency signals. These signals do not follow an underlying MAC protocol and can highly interfere with the normal operation of wireless networks. Jamming attacks represent the denial of service attack in wireless networks. In this paper, we have used OPNET Modeler to perform jamming attacks to investigate wireless network behavior. The results showed t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…This paper will also cover the architecture and software program applied. In the paper [31] wireless communication makes use of three approached to check the performance in evaluating the proposed protocol, namely (a) mathematical analysis, (b) simulation analysis, and (c) test-bed evaluation. Simulation, measurement and analytical modelling are the appropriate instruments to analyse performance of computer system [28].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…This paper will also cover the architecture and software program applied. In the paper [31] wireless communication makes use of three approached to check the performance in evaluating the proposed protocol, namely (a) mathematical analysis, (b) simulation analysis, and (c) test-bed evaluation. Simulation, measurement and analytical modelling are the appropriate instruments to analyse performance of computer system [28].…”
Section: Methodsmentioning
confidence: 99%
“…Body sensors and relay nodes get their power supplies from the batteries embedded in them while the body coordinator is connected to the external power supply. The data is transmitted from the sensor node to the body sensors through routing path [31]. The literature survey reveal that it is essential to do further research on the improvement of congestion control in the transport layer protocol.…”
Section: Wban Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…The OPNET simulator offers an object-oriented programming approach and hierarchical modeling. Additionally, it provides the facility of customized functions where it can be developed from scratch [15], [16], [17], [18]. For example, the researchers in [19] used OPNET and ZigBee to implement WSN to perform water quality monitoring.…”
Section: Literature Reviewmentioning
confidence: 99%