Singla, Bhawna and Verma, A and Raheja, L (2017) A Comparative Analysis of Jellyfish Attacks and Black Hole Attack with Selfish Behavior Attack under AODV Routing Protocol. British Journal of Mathematics & Computer Science, 21 (2). pp. 1-18. ISSN 22310851
Singla2122017BJMCS31430.pdf - Published Version
Download (484kB)
Abstract
The applications of mobile adhoc network (MANET) are increasing day-by-day due to the flexibility they provide to seamless communication. However MANETS are vulnerable to number of attacks because of properties like non-existing infrastructure, dynamic topology, multihop network etc. Lot of previous works have focused on the impact of various attack on routing protocol. Some attacks like jellyfish attack even follow all the rules and regulations of routing protocol then also they may cause damage to the communication. On the other hand, some attacks like blackhole attack have malicious intentions and causes destruction by dropping the sent packets. There also exist one other category of attack called selfish node attack that do not causes any destruction by modifying the field of the packet rather they do not cooperate in forwarding the packet. In a typical MANET scenario which may be in use for few minutes or even hours, the attacking node will have time to intervene in to the routing process, and able to make some destruction. But, if the network under consideration will be in use for limited short time for a particular military like quick rescue scenario, then how a malicious node will intervene in to the routing process and make considerable damage to the network within that short duration – this is the research question addressed in this work. In this work we study the impacts of some of the attacks on network under a short term military rescue mission like scenario. We will do a comparative analysis of above discussed attacks under AODV routing protocol. The analysis will be made with respect to different network sizes and under the presence of different number of attackers in the network. The impact on the performance will be measured with suitable metrics to understand the nature of different attacks.
Item Type: | Article |
---|---|
Subjects: | Grantha Library > Computer Science |
Depositing User: | Unnamed user with email support@granthalibrary.com |
Date Deposited: | 10 May 2023 09:01 |
Last Modified: | 25 Jul 2024 07:50 |
URI: | http://asian.universityeprint.com/id/eprint/880 |