DocumentCode :
3240699
Title :
Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack
Author :
Wazid, M. ; Kumar, Vipin ; Goudar, R.H.
Author_Institution :
Dept. of CSE, Graphic Era Univ., Dehradun, India
fYear :
2012
fDate :
6-8 Dec. 2012
Firstpage :
147
Lastpage :
152
Abstract :
A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. Jellyfish is a new denial of service attack. There are three kinds of JellyFish attacks i.e. JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. In JF delay variance attack, intruder node needs to intrude into forwarding group and then it delays data packets for some amount of time before forwarding. Due to JF delay variance attack, high end- to- end delay takes place in the network and performance of the network (i.e. throughput etc) becomes worse. In our paper we have done a comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF delay variance attack with increasing node density. If we have a mobile ad hoc network in which probability of occurrence of JF attack is high and also if it requires time efficient network service for information exchange with increasing number of nodes then we have to choose DSR protocol. If it requires high throughput and consistent service in the network with increasing node density then TORA protocol is recommended.
Keywords :
delays; mobile ad hoc networks; routing protocols; telecommunication security; AODV reactive routing protocols; DSR reactive routing protocols; JF delay variance attack; JF periodic dropping attack; JF reorder attack; TORA reactive routing protocols; ad hoc on demand distance vector routing protocol; data packet delay; denial-of-service attack; dynamic source routing protocol; high end-to-end delay; information exchange; intruder node; jellyfish attack; mobile ad hoc networks; network service; physical security; temporally-ordered routing algorithm; wired network; Delay; Mobile ad hoc networks; Routing protocols; Throughput; Topology; 2ACK; AODV; DSR; JF Delay Variance Attack; TORA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4673-2922-4
Type :
conf
DOI :
10.1109/PDGC.2012.6449807
Filename :
6449807
Link To Document :
بازگشت