DocumentCode
3240699
Title
Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack
Author
Wazid, M. ; Kumar, Vipin ; Goudar, R.H.
Author_Institution
Dept. of CSE, Graphic Era Univ., Dehradun, India
fYear
2012
fDate
6-8 Dec. 2012
Firstpage
147
Lastpage
152
Abstract
A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. Jellyfish is a new denial of service attack. There are three kinds of JellyFish attacks i.e. JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. In JF delay variance attack, intruder node needs to intrude into forwarding group and then it delays data packets for some amount of time before forwarding. Due to JF delay variance attack, high end- to- end delay takes place in the network and performance of the network (i.e. throughput etc) becomes worse. In our paper we have done a comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF delay variance attack with increasing node density. If we have a mobile ad hoc network in which probability of occurrence of JF attack is high and also if it requires time efficient network service for information exchange with increasing number of nodes then we have to choose DSR protocol. If it requires high throughput and consistent service in the network with increasing node density then TORA protocol is recommended.
Keywords
delays; mobile ad hoc networks; routing protocols; telecommunication security; AODV reactive routing protocols; DSR reactive routing protocols; JF delay variance attack; JF periodic dropping attack; JF reorder attack; TORA reactive routing protocols; ad hoc on demand distance vector routing protocol; data packet delay; denial-of-service attack; dynamic source routing protocol; high end-to-end delay; information exchange; intruder node; jellyfish attack; mobile ad hoc networks; network service; physical security; temporally-ordered routing algorithm; wired network; Delay; Mobile ad hoc networks; Routing protocols; Throughput; Topology; 2ACK; AODV; DSR; JF Delay Variance Attack; TORA;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on
Conference_Location
Solan
Print_ISBN
978-1-4673-2922-4
Type
conf
DOI
10.1109/PDGC.2012.6449807
Filename
6449807
Link To Document