slugMitigation of flooding Attack in MANET using NS-3

Abstract

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.

Authors and Affiliations

Abhijeet kumar, Archana Bharti

Keywords

Related Articles

An Integration Testing on Average Categorized ECommerce Based Data to Improve Their Performance Using Automation Tool

in today’s rapid increasing digital world many numbers of electronic commerce companies have making transaction per second which makes it more sensitive data transaction process which need very much care. Big data is a...

Smart Live Tracking Garbage Collection using RFID

This paper was talk about smart bin living with smart bin implementation, solid waste monitoring and management system, the system was integration of communication technologies such as RFID, GPS, GSM and GIS for truck m...

Network Aware Virtual Machine Migration by PSO Optimization

A good VM migration algorithm can greatly improve network performance and scalability. Only a few studies presently focus on the network-aware VM migration (NetVMM) problem. The NetVMM problem is a type of a multiple-kn...

Android application wound assessment System for Patients with Diabetes

Nowadays many doctors and nurses assess the wound just by examining the size of wound and clinical status, while the patient themselves can assess their wounds. It allows a patient to take care of themselves and perform...

Optimization of Shop Floor Layout Based on Material Movement

Layout planning is the systematical arrangement of various machines, equipment and services in industries. It is important to have accurate plant layout for all available resources for increasing the efficiency of indus...

Download PDF file
  • EP ID EP17985
  • DOI -
  • Views 535
  • Downloads 21

How To Cite

Abhijeet kumar, Archana Bharti (2014). slugMitigation of flooding Attack in MANET using NS-3. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17985