Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
@article{Wazid2012ComparativePA, title={Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack}, author={Mohammad Wazid}, journal={2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing}, year={2012}, pages={147-152}, url={https://api.semanticscholar.org/CorpusID:14340469}}
  • Mohammad Wazid
  • Published in 2nd IEEE International… 1 December 2012
  • Computer Science, Engineering
  • 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing

A comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF delay variance attack with increasing node density finds that DSR protocol is preferred and if it requires high throughput and consistent service in the network with increasing nodes density then TORA protocol is recommended.

15 Citations

Background Citations

3

Results Citations

1

Figures and Tables from this paper

  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 8
  • figure 9
  • table I
  • table II
  • table IV
  • table VI

Topics

JF Delay Variance Attack (opens in a new tab)Mobile Ad Hoc Networks (opens in a new tab)Jellyfish (opens in a new tab)Dynamic Source Routing Protocol (opens in a new tab)Temporally-ordered Routing Algorithm (opens in a new tab)Dynamic Source Routing (opens in a new tab)Forwarding Group (opens in a new tab)JF Reorder Attack (opens in a new tab)Routing Protocol (opens in a new tab)Ad Hoc On Demand Distance Vector (opens in a new tab)

15 Citations

Design and Efficient Network Investigation of Passive Periodic Drop Attack
    Sunil KumarM. Singh

    Computer Science, Engineering

    Oriental journal of computer science and…

  • 2021

The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance shows OLSR performs better than AODV under periodic drop attack.

  • 1
Detection and Prevention of Jellyfish Attack in AODV Routing Protocol in MANET
    Sanjay Kumar

    Computer Science, Engineering

  • 2017

This paper proposes a solution to the JellyFish delay variance attack in ad-hoc on demand distance vector (AODV) routing protocol for MANETs.

  • 2
Performance Evaluation of AODV with Self-Cooperative Trust Scheme Using Jellyfish Delay Variance Attack
    D. DeepikaS. Saxena

    Computer Science, Engineering

    2018 Second International Conference on…

  • 2018

AODV outperforms DSR protocol for several performance parameters, which include “Throughput” and “E2E Delay” with JFDV detection algorithm, and algorithm provides better identification and removal in AODV protocol.

  • 2
Enhanced AODV protocol for defence against JellyFish Attack on MANETs
    Sakshi GargS. Chand

    Computer Science, Engineering

    2014 International Conference on Advances in…

  • 2014

An enhancement in AODV protocol is proposed so as to detect the malicious nodes in a network and to remove them from the routing path without their knowledge to defence against JellyFish delay variance attack in Mobile Ad-hoc networks.

  • 16
Mitigation and Detection of Jellyfish Delay Variance Attack in MANET
    Ankit M. VaghelaProf. Ashish Patel

    Computer Science, Engineering

  • 2017

This research proposes a new technique which can be used to detect and mitigate the Jellyfish delay variance (JFDV) attack using Network Simulation 2(NS2).

Performance Comparison and Analysis of AODV, OLSR and TORA using Jelly Fish Attack under MANET
    Pardeep SinghRachna Rajput

    Computer Science, Engineering

  • 2014

This paper will compare the performance of AODV, OLSR and TORA Under Jelly Fish attack and Normal scenario with different no of Node scenarios.

  • 3
An analytical survey of state of the art JellyFish attack detection and prevention techniques
    Anjani GargSunil KumarKamlesh Dutta

    Computer Science, Engineering

    2016 Fourth International Conference on Parallel…

  • 2016

The main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.

  • 3
Analysis of Jellyfish Reorder Attack on ZRP
    P. MaheshwariLeenu Singh

    Computer Science

  • 2015

This paper is focused on analyzing the impact of the jellyfish reorder attack on the ZRP protocol by using NS2 as a simulator and the metrics used during the simulation are Goodput and End-to-End Delay.

  • 2
Identifying And Evaluating Jelly Fish Attack Using Aodv Protocol
    Kulbir SinghJ. S. Arora

    Computer Science, Engineering

  • 2015

The open and dynamic operational environment of MANET makes it vulnerable to various network attacks.

  • PDF

...

...

25 References

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
    Hoang Lan NguyenU. T. Nguyen

    Computer Science, Engineering

    International Conference on Networking…

  • 2006
  • 242
  • PDF
Performance Analysis of AODV using HTTP trafficunder Black Hole Attackin MANET
    Ekta BarkhodiaParulpreet SinghGurleen Kaur

    Computer Science, Engineering

  • 2012

The effect of black hole attack on ad hoc network using AODV as a routing protocol with Http traffic load will be examined and performance analysis of A ODV reactive protocol is evaluated with respect to throughput and end -toend delay using OPNET modeller.

  • 8
  • PDF
A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network
    B. B. JayasinghB. Swathi

    Computer Science, Engineering

  • 2010

The novel metric that detects the Jellyfish reorder attack based on the Reorder Density which is a basis for developing a metric is proposed and helps protocol designers to develop the counter strategies for the attack.

  • 30
  • PDF
Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks
    Syed Atiya Begum

    Computer Science, Engineering

  • 2012

The mechanisms described here seek to limit the damage sustained by ad hoc networks from intrusion attacks and allow for continued network operation at an acceptable level during such attacks.

  • 26
Detecting blackhole attacks on DSR-based mobile ad hoc networks
    I. WoungangS. K. DhurandherR. D. PeddiM. Obaidat

    Computer Science, Engineering

    2012 International Conference on Computer…

  • 2012

Simulation results are provided, showing that the proposed DBA-DSR scheme outperforms DSR in terms of packet delivery ratio and network throughput, chosen as performance metrics, when blackhole nodes are present in the network.

  • 41
Impact of Denial of Service Attacks on Ad Hoc Networks
    I. AadJean-Pierre HubauxE. Knightly

    Computer Science, Engineering

    IEEE/ACM Transactions on Networking

  • 2008

This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.

  • 229
  • PDF
Denial of service resilience in ad hoc networks
    I. AadJ. HubauxE. Knightly

    Computer Science, Engineering

    MobiCom '04

  • 2004

This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.

  • 371
  • PDF
The Simulation and Comparison of Routing Attacks on DSR Protocol
    Jiwen CaiPing YiYe TianYongkai ZhouNing Liu

    Computer Science, Engineering

    2009 5th International Conference on Wireless…

  • 2009

The authors evaluate these attack patterns' impact and draw the conclusion that flooding attack is more dangerous than black hole attacks and active black hole bring about larger damage.

  • 32
    A. ThakareMonali JoshiS.R.T.M.U. Nanded

    Computer Science, Engineering

  • 2010

An attempt has been made to compare the performance of two prominent on demand reactive routing protocols for MANETs: Ad hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols.

  • 58
    M. WazidR. Singh Bhawna Kochar

    Computer Science, Engineering

  • 2012

This paper investigates different types of attacks which are happened at the different layers of MANET after that it discusses some available detection techniques for these attacks.

  • 35

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Melvina Ondricka

    Last Updated:

    Views: 5917

    Rating: 4.8 / 5 (48 voted)

    Reviews: 87% of readers found this page helpful

    Author information

    Name: Melvina Ondricka

    Birthday: 2000-12-23

    Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

    Phone: +636383657021

    Job: Dynamic Government Specialist

    Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

    Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.