Academia.eduAcademia.edu

Outline

Detection Mechanism for Jamming Attack in MANET

Abstract

— The mobile ad-hoc network is the self configuring type of network in which mobile nodes can its location any time. Due to its decentralized nature, much type of active and passive attacks is possible in the network. Jamming is the active type of attack which degrades network performance in terms of throughput, Packetloss, Retransmission attempts, Energy and PDR. In this work, novel technique is been proposed which will detect and isolate malicious nodes from the network. The proposed technique will be based on monitor mode and threshold. The simulation is been performed in NS2 and it is been analyzed that proposed technique performs well in terms of throughput, Packetloss, Retransmission attempts, Energy and PDR.

References (11)

  1. Caimu Tang ,Dapeng Oilver," An Efficient Mobile Authentication Scheme for Wireless Networks", IEEE, vol 7, issue 4, (2010), pp. 1408 -1416.
  2. Jacek Cicho, Rafał Kapelko, Jakub Lemiesz, and Marcin Zawada "On Alarm Protocol in Wireless Sensor Networks", 9th International Conference, volume 6288, ISSN: 0302-9743, (2010), pp 43-52.
  3. Priyanka Goyal, Vintra Parmar and Rahul Rishi ," MANET: Vulnerabilities, Challenges, Attacks, Application", IJCEM International Journal of Computational Engineering & Management, Vol. 11, ISSN (Online): 2230-7893 (2011), pp. 345-358.
  4. D. Liu, J. Raymer, A. Fox "Efficient and Timely Jamming Detection in Wireless Sensor Networks" in 9th International Conference on Mobile Adhoc and Sensor Systems MASS, page 335-343. IEEE Computer Society, December 2012.
  5. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, "An Overview of Mobile Ad Hoc Networks: Applications and Challenges", IJSER, volume 3, issue 3, (2005), pp. 60-66.
  6. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", Springer, (2006), pp 103-135.
  7. Sevil Şen, John A. Clark, Juan E. Tapiador, "Security Threats in Mobile Ad Hoc Networks", IEEE, (2010).
  8. Rusha Nandy, "Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme" Int. J. Advanced Networking and Applications Volume: 03, Issue: 01, (2011), Pages: 1035-1043.
  9. Wenjia Li and Anupam Joshi , "Security Issues in Mobile Ad Hoc Networks-A Survey", (2005).
  10. Vinit Garg, Manoj Kr.Shukla, Tanupriya Choudhury, Charu Gupta, "Advance Survey of Mobile Ad-Hoc Network," IJCST Vol. 2, Issue 4, (2011), ISSN: 2229- 4333.
  11. Humayun Bakht," Survey of Routing Protocols for Mobile Ad-hoc Network", International Journal of Information and Communication Technology Research, Volume 1 No. 6, (2011), ISSN-2223-4985.