Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.

Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attack...

Full description

Saved in:
Bibliographic Details
Main Authors: Mina, Malekzadeh, Abdul Azim, Abdul Ghani, Subramaniam, Shamala, Desa , Jalil
Format: Article
Language:English
Published: Femto Technique 2011
Online Access:http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf
http://psasir.upm.edu.my/id/eprint/17572/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.17572
record_format eprints
spelling my.upm.eprints.175722015-10-16T07:06:18Z http://psasir.upm.edu.my/id/eprint/17572/ Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed. Mina, Malekzadeh Abdul Azim, Abdul Ghani Subramaniam, Shamala Desa , Jalil Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and discard forgery frames. In this research in parallel to our experiments, we develop an extension module for wireless DoS attacks using OMNeT ++ to assess the reliability of this simulation tool in compare to our real 802.11 wireless network testbed. To fulfill these goals, throughput, end- to-end delay, and pocket lost ratio are considered as our performance measures running on both real testbed and simulation model. The results are used as a comparative acceptance of the simulation environment. Hereby we can confirm accuracy of the simulation results and OMNeT ++ in wireless DoS attack domain Femto Technique 2011-07 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf Mina, Malekzadeh and Abdul Azim, Abdul Ghani and Subramaniam, Shamala and Desa , Jalil (2011) Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed. International Journal of Network Security, 13 (1). pp. 13-21. ISSN 1816-3548
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and discard forgery frames. In this research in parallel to our experiments, we develop an extension module for wireless DoS attacks using OMNeT ++ to assess the reliability of this simulation tool in compare to our real 802.11 wireless network testbed. To fulfill these goals, throughput, end- to-end delay, and pocket lost ratio are considered as our performance measures running on both real testbed and simulation model. The results are used as a comparative acceptance of the simulation environment. Hereby we can confirm accuracy of the simulation results and OMNeT ++ in wireless DoS attack domain
format Article
author Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
spellingShingle Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
author_facet Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
author_sort Mina, Malekzadeh
title Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_short Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_full Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_fullStr Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_full_unstemmed Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_sort validating reliability of omnet++ in wireless networks dos attacks: simulation vs. testbed.
publisher Femto Technique
publishDate 2011
url http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf
http://psasir.upm.edu.my/id/eprint/17572/
_version_ 1643826558581866496
score 13.211869