Service Attack Dos In Wireless Lan Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

IEEE 802.11 Wireless Local Area Network is a kind of Local Area Network that is widely deployed as extension of wired LAN infrastructures [3, 7]. It communicates and transmits data through the air. Normally, it uses high frequency radio waves to communicate and transmit data. Nowadays, Universities, Companies and Business environment use WLAN for their activities.

In Wireless LAN, All data carried over the air. So, there are vulnerable to attack against communications and data transfers in WLAN. Any malicious user or device would easily listen and capture data, analyze, modify data, deny valid user access to network services and disturb communications channels as valid user or device. So, the security should be concerned about the communication and data transmit in Wireless LAN [1, 3, 7].

The IEEE 802.11 standard was developed to address the Wireless LAN security [1]. But still, Wireless LAN is vulnerable to attack.

Project Background

Denial of Service Attack (DOS) in Wireless LAN

The DOS is a kind of security attacks on Wireless LAN. Wireless LAN uses radio frequency. The frequency interference is common problem in wireless LAN. The channel quality, network availability decreases as interference increases. The noise generators can easily jam the Wireless LAN by generating continuous radio frequency (RF) noise. This reduces the performance and data transmission at all on the jammed channel. This DOS is called frequency jamming [2]. It can be detected by a Wireless LAN monitoring System by using receive signal strength, noise floor level at physical layer [2].

"IEEE 802.11 Wireless LAN networks communicate at the MAC layer by exchanging the three class of frames, namely the data frames, control frames, and management frames" [7]. Any modifications of these frames that directly or indirectly affect the data confidentiality and integrity.

IEEE 802.11b DCF (distributed coordination function) is a reservation based medium access control protocol. It senses the medium to determine the state of the carrier channel. It uses network allocation vector as a prediction of future traffic on the medium. The fake reservation can efficiently disturb the any general reservation. This misbehaves the MAC layer access time. This DOS is called protocol aware jammer [5]. It reduces network through as a result.

Proposed work

Rakes Kumar, Upena Dala [2] proposed influence of jamming that launched in an access point based 802.11b. They have used WLAN Ethernet router and Ethernet bridge in their simulations and analyzed the performance of network. O.N.Odhiambo, E.Biermann and G.Noel [7] proposed RSM security model and analyzed network performance with influence of frequency jamming. They have observed throughput, end-to-end delay for video traffic. M.Acharya, D.Thuente [5] proposed various protocols aware jamming that can be lounged in an access point based 802.11 networks and analyzed the throughput and traffic effect by this misbehaving.

I am going to do research on these DOS attacks against the access point in wireless LAN and how these attacks affect the network performance for kind of traffic such as voice, video, and Http traffic. Propose a sample Wireless LAN model with number of wireless nodes. All wireless nodes access the server through the access point (AP). Simulate this network for a much enough time. Create the jammers on this same network and simulate this network for much enough time with jammers. Simulate the same network with and without jammers for a different kind of traffic. Then research the effect of these attacks in network performance.

My next work is related to security analysis on data traffic between access point (AP) and server. There is also vulnerable to attack on this traffic. I am going to use firewall and Virtual Private Network (VPN) over this traffic and research security performance by measuring the response time and load of VPN over Wireless LAN.


Suggest security models for Wireless LAN by analysing the Wireless network security.

Problem identification and Methodology

Problem identification

First task: Identifying the various security vulnerabilities against the Wireless LAN by searching the security problem through research papers, books, related journals and internet.

Second task: Create sample wireless network models and simulate the network. Create attackers against the network and simulate the network with possible attacks. Collecting the results and analysing the network performance.

Implement VPN and Firewalls between access point and server and analysing the network performance by measuring needed statistics.

Third task: Based on the analysis, suggest security model that improves the performance of network.


The methodology that I am going to use in order to achieve the first task read available research papers that are related to my project through LRC network.

To achieve second task, I am going to be used "OPNET Modeler 16.0" on my computer and should use our university network to access the licence of OPNET. It provides wireless network objects and option to set network parameters.

My system requirements for using "OPNET Modeler 16.0"

Windows 7 professional (32 bits and 64 bits)

CPU: 2.24GHz


Display: 1024 * 768(minimum)

Project Objectives

Core Objectives

My main objective is to analysis the wireless network security. And then suggest security models that improving the performance against the Wireless LAN attacks. It will help to build up wireless network with security aspects.

I am going to do research in jamming attacks on Wireless LAN. I'm going to be used wireless network security related materials through the IEEE research papers, books and Journals. Collecting needful information about jamming attacks against the Wireless LAN.

Create a sample wireless network model using "OPNET Modeler 16.0" and simulate the network for different type of traffic.

Create jammer attackers on the same sample networks using "OPNET Modeler 16.0" and simulate the network again.

Collecting results and analysing the performance using both results and do the simulations with various parameters such as number of nodes.

Implement firewalls and VPN between routers and server. Analysis how to secure and improve the traffic between client and server.

Suggest security models to improve the network performance from the attacks.

I have enough confident that my objectives are achievable, simple, measurable, relevant and time-constrained.

Advance Objective

Implementing security models on wireless network what I have been suggested from my research results. Simulate the wireless network with these security models and collect results. Analysis the how these security models improve the network performance when any attack occurs.

Applying these models for different type of traffic and wireless network topology and collecting the results and analysis the performance.

Based on analysis, improve the functionality of security models.

Project Plan

The project plan is prepared to avoid project delay. The assigned work should be finished by the target dates. The Gantt chart is prepared to achieve my project successfully.





















1). Going through the different research papers, journals and books

2). Researching on Wireless LAN security issues and analysing the security issue which I

have identified.

3). Identify the security attacks that on which I am going to do my research and find

supported tools to implement.

4). Create sample wireless network model using OPNET Modeler 16.0, set network

parameters and run the simulations.

5). Longue the jamming attacks against the created models and run simulations

6). Simulate the both at same times and collect results. Do the same work more times with

different type of traffic.

7). Analysing the performance of the network based on results

8). Implementing VPN, Firewall between router and server, simulate the network and

measure the statistics.

9). Suggest security models based on analysing the performance

10).Drafting the Thesis of Project.