slugMitigation of flooding Attack in MANET using NS-3

Abstract

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.

Authors and Affiliations

Abhijeet kumar, Archana Bharti

Keywords

Related Articles

Thermal Effects on Mullite Coated Diesel Engine Piston for Various Coating Thickness

Diesel engines are prime role in medium and heavy duty applications due to grander characteristics such as lower fuel consumption, high engine power output and lower emissions as compared with gasoline functioned engine...

Review on Real Time Data Encryption in H.264/Avc Video Streams by Exploiting IPCM Microblocks

In daily life, there is an increase in the use of multimedia applications such video conferencing, video telephony, stream video/audio online etc. For the purpose of highly secure data transmission safely, there is a re...

The Future Scope of Business Intelligence (BI)

Business intelligence (BI) is a broad category of application on programs and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI appl...

DC Electrical Properties of Antimony Substituted Lithium Ferrites

This paper discusses the DC electrical properties of antimony substituted lithium ferrites with compositional formula [Li0.5+x SbxFe2.5-2x O4]; where x=0.0 to 1.0 insteps of 0.1 prepared by conventional standard ceramic...

Under-Water Welding Using Robotic Technology

Welding in offshore and marine application is an area of research and understanding, where many problems are still unsolved. The important application of the off shore welding is the ship building and pipeline construct...

Download PDF file
  • EP ID EP17985
  • DOI -
  • Views 469
  • Downloads 21

How To Cite

Abhijeet kumar, Archana Bharti (2014). slugMitigation of flooding Attack in MANET using NS-3. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17985