2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks 2013
DOI: 10.1109/cicsyn.2013.79
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of 802.11 Physical Layer Attacks in MANET

Abstract: Researchers have focused on security aspects of different Mobile Ad Hoc Network (MANET) protocols to prevent Physical Layer attacks through different complex mechanisms. DoS attacks are one of the most harmful attacks against functionality and stability of network systems. MANETs are more vulnerable to Physical Layer attacks due to limited resources that force them to be greedy in resource utilization. Physical layer attacks aims to paralyze the member of the network (a node or service provider) or the entire … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
8

Relationship

7
1

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…The load can be observed in Figure 5. Throughput represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN nodes of the network [17] [19]. Throughput is represented in Figure 6.…”
Section: Resultsmentioning
confidence: 99%
“…The load can be observed in Figure 5. Throughput represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN nodes of the network [17] [19]. Throughput is represented in Figure 6.…”
Section: Resultsmentioning
confidence: 99%
“…Since the communication is provided in 2 different way in VANET, there are some fixed node that act as a roadside unit or equipment which enables the ease of VANET to serve as a gateway to the internet and also in accessing geographical data [12]- [14]. Each node in the VANET doesn't only participate in data transmission and receiving, they also act as a wireless router of the network as different nodes communicate via their own communication range, permitting cars in the region of 100 to 300 meters of each other to join the network, and create a network with a wide range.…”
Section: Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%
“…In 21st century's digital world, threats to data centers can come in various forms; it could come through an intruder attempting to gain physical access to the data center facility/servers, to a hack attack over a porous network [36].…”
Section: Security Issues In Green Data Centersmentioning
confidence: 99%