Skip to search formSkip to main contentSkip to account menu
DOI:10.1109/PDGC.2012.6449807 - Corpus ID: 14340469
@article{Wazid2012ComparativePA, title={Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack}, author={Mohammad Wazid}, journal={2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing}, year={2012}, pages={147-152}, url={https://api.semanticscholar.org/CorpusID:14340469}}
- Mohammad Wazid
- Published in 2nd IEEE International… 1 December 2012
- Computer Science, Engineering
- 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing
A comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF delay variance attack with increasing node density finds that DSR protocol is preferred and if it requires high throughput and consistent service in the network with increasing nodes density then TORA protocol is recommended.
15 Citations
3
1
Figures and Tables from this paper
- figure 1
- figure 2
- figure 3
- figure 4
- figure 5
- figure 8
- figure 9
- table I
- table II
- table IV
- table VI
Topics
JF Delay Variance Attack (opens in a new tab)Mobile Ad Hoc Networks (opens in a new tab)Jellyfish (opens in a new tab)Dynamic Source Routing Protocol (opens in a new tab)Temporally-ordered Routing Algorithm (opens in a new tab)Dynamic Source Routing (opens in a new tab)Forwarding Group (opens in a new tab)JF Reorder Attack (opens in a new tab)Routing Protocol (opens in a new tab)Ad Hoc On Demand Distance Vector (opens in a new tab)
15 Citations
- S. Sushanth Kumar
- 2016
Computer Science, Engineering
- 5
- Sunil KumarM. Singh
- 2021
Computer Science, Engineering
Oriental journal of computer science and…
The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance shows OLSR performs better than AODV under periodic drop attack.
- 1
- Sanjay Kumar
- 2017
Computer Science, Engineering
This paper proposes a solution to the JellyFish delay variance attack in ad-hoc on demand distance vector (AODV) routing protocol for MANETs.
- 2
- D. DeepikaS. Saxena
- 2018
Computer Science, Engineering
2018 Second International Conference on…
AODV outperforms DSR protocol for several performance parameters, which include “Throughput” and “E2E Delay” with JFDV detection algorithm, and algorithm provides better identification and removal in AODV protocol.
- 2
- Sakshi GargS. Chand
- 2014
Computer Science, Engineering
2014 International Conference on Advances in…
An enhancement in AODV protocol is proposed so as to detect the malicious nodes in a network and to remove them from the routing path without their knowledge to defence against JellyFish delay variance attack in Mobile Ad-hoc networks.
- 16
- Ankit M. VaghelaProf. Ashish Patel
- 2017
Computer Science, Engineering
This research proposes a new technique which can be used to detect and mitigate the Jellyfish delay variance (JFDV) attack using Network Simulation 2(NS2).
- Pardeep SinghRachna Rajput
- 2014
Computer Science, Engineering
This paper will compare the performance of AODV, OLSR and TORA Under Jelly Fish attack and Normal scenario with different no of Node scenarios.
- 3
- Anjani GargSunil KumarKamlesh Dutta
- 2016
Computer Science, Engineering
2016 Fourth International Conference on Parallel…
The main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.
- 3
- P. MaheshwariLeenu Singh
- 2015
Computer Science
This paper is focused on analyzing the impact of the jellyfish reorder attack on the ZRP protocol by using NS2 as a simulator and the metrics used during the simulation are Goodput and End-to-End Delay.
- 2
- Kulbir SinghJ. S. Arora
- 2015
Computer Science, Engineering
The open and dynamic operational environment of MANET makes it vulnerable to various network attacks.
- PDF
...
...
25 References
- Hoang Lan NguyenU. T. Nguyen
- 2006
Computer Science, Engineering
International Conference on Networking…
- 242
- PDF
- Ekta BarkhodiaParulpreet SinghGurleen Kaur
- 2012
Computer Science, Engineering
The effect of black hole attack on ad hoc network using AODV as a routing protocol with Http traffic load will be examined and performance analysis of A ODV reactive protocol is evaluated with respect to throughput and end -toend delay using OPNET modeller.
- 8
- PDF
- B. B. JayasinghB. Swathi
- 2010
Computer Science, Engineering
The novel metric that detects the Jellyfish reorder attack based on the Reorder Density which is a basis for developing a metric is proposed and helps protocol designers to develop the counter strategies for the attack.
- 30
- PDF
- Syed Atiya Begum
- 2012
Computer Science, Engineering
The mechanisms described here seek to limit the damage sustained by ad hoc networks from intrusion attacks and allow for continued network operation at an acceptable level during such attacks.
- 26
- I. WoungangS. K. DhurandherR. D. PeddiM. Obaidat
- 2012
Computer Science, Engineering
2012 International Conference on Computer…
Simulation results are provided, showing that the proposed DBA-DSR scheme outperforms DSR in terms of packet delivery ratio and network throughput, chosen as performance metrics, when blackhole nodes are present in the network.
- 41
- I. AadJean-Pierre HubauxE. Knightly
- 2008
Computer Science, Engineering
IEEE/ACM Transactions on Networking
This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.
- 229
- PDF
- I. AadJ. HubauxE. Knightly
- 2004
Computer Science, Engineering
MobiCom '04
This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.
- 371
- PDF
- Jiwen CaiPing YiYe TianYongkai ZhouNing Liu
- 2009
Computer Science, Engineering
2009 5th International Conference on Wireless…
The authors evaluate these attack patterns' impact and draw the conclusion that flooding attack is more dangerous than black hole attacks and active black hole bring about larger damage.
- 32
- A. ThakareMonali JoshiS.R.T.M.U. Nanded
- 2010
Computer Science, Engineering
An attempt has been made to compare the performance of two prominent on demand reactive routing protocols for MANETs: Ad hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols.
- 58
- M. WazidR. Singh Bhawna Kochar
- 2012
Computer Science, Engineering
This paper investigates different types of attacks which are happened at the different layers of MANET after that it discusses some available detection techniques for these attacks.
- 35
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers