In general, wireless networks are deployed in homes, businesses,production plants, and other private or public environments
where security of communications is important. Many publications have addressed practical attacks on the availability
of IEEE 802.11 networks on both the physical layer (PHY)and the medium access control (MAC) layer. One of the traditional attacks at the PHY layer is jamming of the radio band. On the MAC layer, more sophisticated attacks could be
implemented to attack the MAC protocols. The attacks could be grouped into three categories [2]: