slugMitigation of flooding Attack in MANET using NS-3

Abstract

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.

Authors and Affiliations

Abhijeet kumar, Archana Bharti

Keywords

Related Articles

New Steganalysis Approach for JPEG Image Steganography using F5 Algorithm

Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover me...

Identity and Access Management in Cloud Computing

In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a clo...

Multi MOSFET Series Resonant Inverter for Enhancing the Efficiency of Induction Cooktops

One of the most threatening problems that we witness is the increasing cost and dearth of cooking gas. An alternate method is to use Induction heating system, where electricity is used for the generation of heat. Resona...

Block Based Motion Estimation Transmission over Wireless Channels Using Distance Power Adaptation

Block based transmission plays an important role for video transmission in wireless communications. This paper proposes a Distance based Power Adaptation Algorithm (DPAA) for Motion Estimation to improve the motion esti...

Differentiate Different Methodology for Design of Vedic Multiplier

Multiplier is one of the most important part in any processor speed which improves the speed of the operation for example in special application processors like Digital Signal Processor (DSPs). Basically, the operationa...

Download PDF file
  • EP ID EP17985
  • DOI -
  • Views 505
  • Downloads 21

How To Cite

Abhijeet kumar, Archana Bharti (2014). slugMitigation of flooding Attack in MANET using NS-3. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17985