Advertisement

Performance Analysis of Network Layer Security Attack in WiMAX System

  • Rakesh Kumar Jha
  • Suresh Limkar
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)

Abstract

In the last few years there has been significant growth in the wireless communications. Security issues are prime concern in wireless communication networks. In this paper analyzed and observed the performance one of the most challenging attack i.e Black hole attacks in WiMAX-WLAN interface network. Black hole attack is very important for NGN (Next Generation Network) because this attack is very much possible in WiMAX-WLAN interface network with high impact with fewer efforts by intruder nodes. In our case study intruder node associated with less buffer size and it is moving with defined trajectory from router WiMAX-WLAN converter. In this observation there are three possibility of black hole attack has been studied i.e on the basis of less buffer size, medium buffer size and finally default buffer size. This attack is effected the performance of entire network like decrease the throughput and increase the packet dropped or delay. In last phase observed that the AP (Access Point) is highly sensitive for black hole attack with respect to buffer size.

Keywords

WiMAX WLAN WiMAX WLAN Black Hole attack NGN Security Throughput Delay OPNET Modeler 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ullah, I., Rehman, S.U.: Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols, A Mater Thesis, Electrical Engineering, Thesis No. MEE 10:62 (June 2010)Google Scholar
  2. 2.
    Guerin, R., Peris, V.: Quality of Service in packet networks: Basic mechanisms and directions. Computer Networks 31(3), 169–189 (1999)CrossRefGoogle Scholar
  3. 3.
    Lu, J., Ma, M.: Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system. Journal of Network and Computer Applications 34(2), 765–773 (2011)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Sayenko, A., Alanen, O., Karhula, J., Hämäläinen, T.: Ensuring the QoS requirements in 802.16 scheduling. In: MSWiM 2006: Proceedings of the 9th ACM International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems (October 2006)Google Scholar
  5. 5.
    Lucio, G.F., Paredes-Farrera, M., Jammeh, E., Fleury, M., Reed, M.J.: Electronic Systems Engineering Department, University of Essex, OPNET Modeler and Ns-2: Comparing the Accuracy Of Network Simulators for Packet-Level Analysis using a Network Test bed (2005)Google Scholar
  6. 6.
    Saad, W., Dawy, Z., Sharafeddine, S.: A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks., Journal of Network and Computer Applications (In Press, Corrected Proof)Google Scholar
  7. 7.
    Nuaymi, L.: WiMAX Technology for Broadband Wireless Access. John Wiley & Sons, France (2007)Google Scholar
  8. 8.
    Ozcelik, I.: Interconnection of CAN segments through IEEE 802.16 wireless MAN. Journal of Network and Computer Applications 31(4), 879–890 (2008)CrossRefGoogle Scholar
  9. 9.
    IEEE. Standard 802.16-2004, Part 16: Air interface for fixed broadband wireless access systems (June 2004)Google Scholar
  10. 10.
    IEEE. Standard 802.16-2005, Part 16: Air interface for fixed and mobile broadband wireless access systems (December 2005)Google Scholar
  11. 11.
    Andrews, J.G., Ghosh, A., Muhammad, R.: Fundamentals of WiMAX Understanding Broadband Wireless Networking, pp. 1–63, 271–292 (2007)Google Scholar
  12. 12.
    Yan Zhang, H.-H.C.: Mobile WiMAX: Toward Broadband Wireless. Auerbach Publication, New York (2008)Google Scholar
  13. 13.
    Ahmedi, S.: Introduction to Mobile WiMAX Radio Access Technology: PHY and MAC Architecture. Intel CorporationGoogle Scholar
  14. 14.
    Jha, R., Dalal, U.: WiMAX System Simulation and Performance Analysis under the Influence of Jamming. Wireless Engineering and Technology(WET) Journal by Scientific Research 1(1), 20–26 (2010)Google Scholar
  15. 15.
    Jha, R., Dala, U.D.: A Journey on WiMAX and Its Security Issues. International Journal of Computer Science and Information Technologies 1(4), 256–263 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringSVNIT SuratSuratIndia
  2. 2.Department of Computer EngineeringAISSMS’s IOITPuneIndia

Personalised recommendations