A Comparative Analysis of Jellyfish Attacks and Black Hole Attack with Selfish Behavior Attack under AODV Routing Protocol
Journal Title: Journal of Advances in Mathematics and Computer Science - Year 2017, Vol 21, Issue 2
Abstract
The applications of mobile adhoc network (MANET) are increasing day-by-day due to the flexibility they provide to seamless communication. However MANETS are vulnerable to number of attacks because of properties like non-existing infrastructure, dynamic topology, multihop network etc. Lot of previous works have focused on the impact of various attack on routing protocol. Some attacks like jellyfish attack even follow all the rules and regulations of routing protocol then also they may cause damage to the communication. On the other hand, some attacks like blackhole attack have malicious intentions and causes destruction by dropping the sent packets. There also exist one other category of attack called selfish node attack that do not causes any destruction by modifying the field of the packet rather they do not cooperate in forwarding the packet. In a typical MANET scenario which may be in use for few minutes or even hours, the attacking node will have time to intervene in to the routing process, and able to make some destruction. But, if the network under consideration will be in use for limited short time for a particular military like quick rescue scenario, then how a malicious node will intervene in to the routing process and make considerable damage to the network within that short duration – this is the research question addressed in this work. In this work we study the impacts of some of the attacks on network under a short term military rescue mission like scenario. We will do a comparative analysis of above discussed attacks under AODV routing protocol. The analysis will be made with respect to different network sizes and under the presence of different number of attackers in the network. The impact on the performance will be measured with suitable metrics to understand the nature of different attacks.
Authors and Affiliations
Bhawna Singla, A. K. Verma, L. R. Raheja
A Useful Result on the Covariance Between Ito Integrals
This article introduces a general result on the covariance between two Ito integrals driven by two different Brownian motions, which slightly generalizes the isometry property. This result finds applications in mathemati...
The Gamma Function and Its Analytical Applications
This paper explores the history and properties of the Gamma function with some analytical applications. Specifically, the Gamma function is employed to prove the legitimacy of the Standard Normal Distribution and for eva...
On the Hyper-Poisson Distribution and its Generalization with Applications
In this paper, we fit the hyper-Poisson, and the Mittag-Leffer function (MLFD) distributions to data exhibiting over and under dispersion. Three frequency data sets were employed with one exhibiting under-dispersion. We...
Breaking of Spiral Waves Due to Obstacles
A spiral wave, which is a self-sustaining wave, is believed to be the source of certain types of arrhythmias, which can lead to fibrillation. In this paper, we study a generic model for the propagation of electrical impu...
Analysis of a Repairable k-out-of-n:G System with Expert Repairman's Multiple Vacations and Shut off Rule
This paper investigates an k-out-of-n:G repairable system with expert repairman’s multiple vacations and continuous operation rule where the operating times and the repair times of components follow exponential distribut...