Physical Layer Jamming Attack using Waypoint Mobility Model in WLAN
نویسندگان
چکیده
منابع مشابه
Waypoint Mobility Model
Wide area research has been done in MANETs, with a major focus on the routing protocols in MANETs i.e AODV, DSR, OLSR and so many others. Much research has been done using different tools to study and analyze the performance of the routing protocols in MANET. Different results are shown by the different simulation environments depending on the number of mobile nodes, mobile node speed and varyi...
متن کاملRandom waypoint mobility model in cellular networks
In this paper we study the so-called random waypoint (RWP) mobility model in the context of cellular networks. In the RWP model the nodes, i.e. mobile users, move along a zigzag path consisting of straight legs from one waypoint to the next. Each waypoint is assumed to be drawn from the uniform distribution over the given convex domain. In this paper we characterise the key performance measures...
متن کاملPerformance Evaluation of AODV Protocol Using Random Waypoint Mobility Model
Abstract Mobile ad hoc network is a kind of dynamic network. In this network the mobile nodes dynamically form a temporary network without any centralized administration or the use of any existing network infrastructure. A number of routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV) have been prop...
متن کاملPerformance Evaluation of TORA Protocol Using Random Waypoint Mobility Model
Mobile ad hoc network is a kind of dynamic network. In this network the mobile nodes dynamically form a temporary network without any centralized administration or the use of any existing network infrastructure. A number of routing protocols like Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV) have been proposed. TOR...
متن کاملConnectivity jamming game for physical layer attack in peer to peer networks
Because of the open access nature of wireless communications, wireless networks can suffer from malicious activity, such as jamming attacks, aimed at undermining the network’s ability to sustain communication links and acceptable throughput. One important consideration when designing networks is to appropriately tune the network topology and its connectivity so as to support the communication n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computing Research and Innovation
سال: 2018
ISSN: 2600-8793
DOI: 10.24191/jcrinn.v3i2.82