Physical Layer Jamming Attack using Waypoint Mobility Model in WLAN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Waypoint Mobility Model

Wide area research has been done in MANETs, with a major focus on the routing protocols in MANETs i.e AODV, DSR, OLSR and so many others. Much research has been done using different tools to study and analyze the performance of the routing protocols in MANET. Different results are shown by the different simulation environments depending on the number of mobile nodes, mobile node speed and varyi...

متن کامل

Random waypoint mobility model in cellular networks

In this paper we study the so-called random waypoint (RWP) mobility model in the context of cellular networks. In the RWP model the nodes, i.e. mobile users, move along a zigzag path consisting of straight legs from one waypoint to the next. Each waypoint is assumed to be drawn from the uniform distribution over the given convex domain. In this paper we characterise the key performance measures...

متن کامل

Performance Evaluation of AODV Protocol Using Random Waypoint Mobility Model

Abstract Mobile ad hoc network is a kind of dynamic network. In this network the mobile nodes dynamically form a temporary network without any centralized administration or the use of any existing network infrastructure. A number of routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV) have been prop...

متن کامل

Performance Evaluation of TORA Protocol Using Random Waypoint Mobility Model

Mobile ad hoc network is a kind of dynamic network. In this network the mobile nodes dynamically form a temporary network without any centralized administration or the use of any existing network infrastructure. A number of routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV) have been proposed. TOR...

متن کامل

Connectivity jamming game for physical layer attack in peer to peer networks

Because of the open access nature of wireless communications, wireless networks can suffer from malicious activity, such as jamming attacks, aimed at undermining the network’s ability to sustain communication links and acceptable throughput. One important consideration when designing networks is to appropriately tune the network topology and its connectivity so as to support the communication n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computing Research and Innovation

سال: 2018

ISSN: 2600-8793

DOI: 10.24191/jcrinn.v3i2.82