Open Access   Article Go Back

A Novel Technique to Isolate and Detect Jamming Attack in MANET

Harkiranpreet Kaur1 , Rasneet Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-3 , Page no. 86-90, Mar-2016

Online published on Mar 30, 2016

Copyright © Harkiranpreet Kaur , Rasneet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harkiranpreet Kaur , Rasneet Kaur, “A Novel Technique to Isolate and Detect Jamming Attack in MANET,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.86-90, 2016.

MLA Style Citation: Harkiranpreet Kaur , Rasneet Kaur "A Novel Technique to Isolate and Detect Jamming Attack in MANET." International Journal of Computer Sciences and Engineering 4.3 (2016): 86-90.

APA Style Citation: Harkiranpreet Kaur , Rasneet Kaur, (2016). A Novel Technique to Isolate and Detect Jamming Attack in MANET. International Journal of Computer Sciences and Engineering, 4(3), 86-90.

BibTex Style Citation:
@article{Kaur_2016,
author = {Harkiranpreet Kaur , Rasneet Kaur},
title = {A Novel Technique to Isolate and Detect Jamming Attack in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2016},
volume = {4},
Issue = {3},
month = {3},
year = {2016},
issn = {2347-2693},
pages = {86-90},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=833},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=833
TI - A Novel Technique to Isolate and Detect Jamming Attack in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Harkiranpreet Kaur , Rasneet Kaur
PY - 2016
DA - 2016/03/30
PB - IJCSE, Indore, INDIA
SP - 86-90
IS - 3
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1716 1443 downloads 1457 downloads
  
  
           

Abstract

MANET is infrastructure less, decentralized multi hope network where the nodes are randomly to move in any direction, there each node works as a router and host to send packet to each other, there is no any requirement of fixed infrastructure. There are many security threats in MANET. Various types of attacks can be easily triggered in the network. So MANET has a security issue. In this paper we have discussed about Jamming attack in AODV protocol. Due to this attack network performances degrade. Therefore a novel technique has been proposed to detect and isolate jamming attack in the network using monitoring nodes.

Key-Words / Index Term

MANET, Attacks, Grayhole, Throughput, ZRP, internal attacks

References

[1] Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”, IEEE, 2009
[2] Ashish K. Maurya, D. S. (Nov,2013). "Simulation based Performance Comparison of AODV, FSR and ZRP Routing Protocolin Manet". IJCA , 23-28.
[3] Awadesh Kumar, P. S. (July,2013). ''Performance Anaysis Of AODV ,CBRP,DSDV and DSR MANET Routing Protocols using NS2 sIMULATION''. I.J Computer Network and Information Security , 45-50.
[4] Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (145-150), Feb -2016.
[5] Divangna Gupta, R. K. (aug,2014). Simulationof Different Routing Protocols in MANET Using NS2. International journal of Scientific and Research Publication , 1-5.
[6] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks” ,Springer ,2006
[7] Smita Das, "Routing table of DSDV in Mobile Ad-hoc Networking", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (48-51), Oct -2015, E-ISSN: 2347-2693.
[8] M Ravi Kumar, D. G. (2013). ''Performance Evaluation of AODV and FSR Routing Protocol in MANET. GJCST , 1-7.
[9] Onkar V.Chandure, A. P. (NOV,2012). Simlation of secure AODVin Gray-hole Attack for Mobile ad-hoc Network. IJAET , 67-75.
[10] Onkar V.Chandure, P. (2011). ''A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV Routing protocol in MANET''. IJCSIT , 2607-2611.
[11] Preeti Gharwar, M. S. (April,2013). "Performance Comparison Of Routing Protocols''. IJARCCE , 1920-1924.
[12] Rutvij H. Jhaveri, D. C. (2012). ''A Novel Gray Hole and Black Hole Attacks in Mobile Ad-Hoc Networks''. International Conference on Advanced Computing& Communicaion Technologies'' , 556-560.
[13] Virali Girdhar and Gaurav Banga, "A Comparative Analysis of Different Movement Models in MANET", International Journal of Computer Sciences and Engineering, Volume-03, Issue-06, Page No (9-13), Jun -2015
[14] S onam Gupta and Rekha Sharma,” A QoS Based Simulation Approach of Zone Routing Protocol in Wireless Ad-hoc Networks ”, International Journal of Computer Sciences and Engineering, Volume 2, issue 7, P.No 24-30, 2014