Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Modelling and simulation of jamming ...
~
Fu, Tian.
Linked to FindBook
Google Book
Amazon
博客來
Modelling and simulation of jamming attacks in WLAN.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Modelling and simulation of jamming attacks in WLAN./
Author:
Fu, Tian.
Description:
89 p.
Notes:
Source: Masters Abstracts International, Volume: 50-06, page: 4170.
Contained By:
Masters Abstracts International50-06.
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1510500
ISBN:
9781267339102
Modelling and simulation of jamming attacks in WLAN.
Fu, Tian.
Modelling and simulation of jamming attacks in WLAN.
- 89 p.
Source: Masters Abstracts International, Volume: 50-06, page: 4170.
Thesis (M.S.)--East Carolina University, 2012.
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks are based on communication within radio channels, WLANs are susceptible to malicious attempts to block the channel. One of the most frequently used attacks is a Denial of Service (DoS) attack known as a jamming attack. Jamming attacks interfere with the transmission channels by constantly sending useless packets in order to disturb the communication between legitimate nodes. In real wireless networks where users communicate constantly, a jamming attack can cause serious problems. Because of this, a study of jamming attacks and how to prevent them is necessary. In this thesis, the jamming attacks were simulated in WLAN using OPNET Modeler, in order to provide a better understanding of jamming attacks. This study will be helpful for future research and development of a practical, effective way to avoid jamming attacks. The objectives of this thesis were to simulate client-server and ad-hoc networks and different jammers; launch jamming attacks in order to test how much influence different jammers have in WLAN communications; and to compare the performances of different ad-hoc routing protocols.
ISBN: 9781267339102Subjects--Topical Terms:
1030799
Information Technology.
Modelling and simulation of jamming attacks in WLAN.
LDR
:02158nam a2200277 4500
001
1959765
005
20140520124914.5
008
150210s2012 ||||||||||||||||| ||eng d
020
$a
9781267339102
035
$a
(MiAaPQ)AAI1510500
035
$a
AAI1510500
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Fu, Tian.
$3
2095273
245
1 0
$a
Modelling and simulation of jamming attacks in WLAN.
300
$a
89 p.
500
$a
Source: Masters Abstracts International, Volume: 50-06, page: 4170.
500
$a
Adviser: Te-Shun Chou.
502
$a
Thesis (M.S.)--East Carolina University, 2012.
520
$a
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks are based on communication within radio channels, WLANs are susceptible to malicious attempts to block the channel. One of the most frequently used attacks is a Denial of Service (DoS) attack known as a jamming attack. Jamming attacks interfere with the transmission channels by constantly sending useless packets in order to disturb the communication between legitimate nodes. In real wireless networks where users communicate constantly, a jamming attack can cause serious problems. Because of this, a study of jamming attacks and how to prevent them is necessary. In this thesis, the jamming attacks were simulated in WLAN using OPNET Modeler, in order to provide a better understanding of jamming attacks. This study will be helpful for future research and development of a practical, effective way to avoid jamming attacks. The objectives of this thesis were to simulate client-server and ad-hoc networks and different jammers; launch jamming attacks in order to test how much influence different jammers have in WLAN communications; and to compare the performances of different ad-hoc routing protocols.
590
$a
School code: 0600.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Information Science.
$3
1017528
690
$a
0489
690
$a
0723
710
2
$a
East Carolina University.
$b
Technology Systems.
$3
2095274
773
0
$t
Masters Abstracts International
$g
50-06.
790
$a
0600
791
$a
M.S.
792
$a
2012
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1510500
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9254593
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login