slugMitigation of flooding Attack in MANET using NS-3

Abstract

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.

Authors and Affiliations

Abhijeet kumar, Archana Bharti

Keywords

Related Articles

Lateral Torsional Buckling of Corrugated I-Beam with Sinusoidal Openings

In this thesis, the study of lateral torsional buckling of castellated I beam with trapezoidally corrugated web will be investigated. By utilizing the non linear analysis and FE models to characterize the load- deflecti...

A Survey on Data Privacy and Security in Internet of Things

The Internet of Things (IoT) is the use of intelligently connected devices and systems to use and manage data collected by embedded sensors and actuators in devices. The internet of things allows devices to be controlle...

A Novel Current Control Technique For A Three-Phase Statcom

This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...

Reverse Engineering of Motorcycle Rear Disc Brake System

Generally motorcycles above 150cc have two discs in the rear, one is brake disc rotor and other is sprocket. In this concept one of the discs is removed and two of the vehicle function is achieved in one disc itself. Th...

Clustering For Research Based Projects Using Ontological Text Mining

This paper describes the software infrastructure (or product) which provides an overall description of research project being selection for government and private research funding agencies is an important task. When a l...

Download PDF file
  • EP ID EP17985
  • DOI -
  • Views 468
  • Downloads 21

How To Cite

Abhijeet kumar, Archana Bharti (2014). slugMitigation of flooding Attack in MANET using NS-3. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17985