Please refer to references and outline attached to prepare paper accordingly. please add more references min is 10.
Aziz, I., Yadav, S., & Aziz, I. (2013). Data Encapsulation To Prevent Jamming Attacks In Wireless Networks. International Journal of Computer Technology and Applications, 4(6), 976–976. Retrieved from http://search.proquest.com/docview/1513476424/
Cache, J., Wright, J., & Liu, V. (2010). Hacking exposed, wireless wireless security secrets & solutions (2nd ed.). New York: McGraw-Hill
Bucholtz, C. (1997). Jamming the hackers. Telephony, 232(26), 94. Retrieved from http://search.proquest.com/docview/213970792/
Time to come clean about hacking. (2005). IT Week, 10. Retrieved from http://search.proquest.com/docview/213599744/
Hurley, C. (2007). WarDriving& wireless penetration testing. Rockland, MA: Syngress.