Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.

Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attack...

Full description

Bibliographic Details
Main Authors: Mina, Malekzadeh, Abdul Azim, Abdul Ghani, Subramaniam, Shamala, Desa , Jalil
Format: Article
Language:English
Published: Femto Technique 2011
Online Access:http://psasir.upm.edu.my/id/eprint/17572/
http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf
_version_ 1848843278493941760
author Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
author_facet Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
author_sort Mina, Malekzadeh
building UPM Institutional Repository
collection Online Access
description Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and discard forgery frames. In this research in parallel to our experiments, we develop an extension module for wireless DoS attacks using OMNeT ++ to assess the reliability of this simulation tool in compare to our real 802.11 wireless network testbed. To fulfill these goals, throughput, end- to-end delay, and pocket lost ratio are considered as our performance measures running on both real testbed and simulation model. The results are used as a comparative acceptance of the simulation environment. Hereby we can confirm accuracy of the simulation results and OMNeT ++ in wireless DoS attack domain
first_indexed 2025-11-15T08:12:29Z
format Article
id upm-17572
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T08:12:29Z
publishDate 2011
publisher Femto Technique
recordtype eprints
repository_type Digital Repository
spelling upm-175722015-10-16T07:06:18Z http://psasir.upm.edu.my/id/eprint/17572/ Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed. Mina, Malekzadeh Abdul Azim, Abdul Ghani Subramaniam, Shamala Desa , Jalil Despite current 802.11i security protocol, wireless net- works are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and discard forgery frames. In this research in parallel to our experiments, we develop an extension module for wireless DoS attacks using OMNeT ++ to assess the reliability of this simulation tool in compare to our real 802.11 wireless network testbed. To fulfill these goals, throughput, end- to-end delay, and pocket lost ratio are considered as our performance measures running on both real testbed and simulation model. The results are used as a comparative acceptance of the simulation environment. Hereby we can confirm accuracy of the simulation results and OMNeT ++ in wireless DoS attack domain Femto Technique 2011-07 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf Mina, Malekzadeh and Abdul Azim, Abdul Ghani and Subramaniam, Shamala and Desa , Jalil (2011) Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed. International Journal of Network Security, 13 (1). pp. 13-21. ISSN 1816-3548
spellingShingle Mina, Malekzadeh
Abdul Azim, Abdul Ghani
Subramaniam, Shamala
Desa , Jalil
Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_full Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_fullStr Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_full_unstemmed Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_short Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
title_sort validating reliability of omnet++ in wireless networks dos attacks: simulation vs. testbed.
url http://psasir.upm.edu.my/id/eprint/17572/
http://psasir.upm.edu.my/id/eprint/17572/1/Validating%20reliability%20of%20OMNeT.pdf