slugMitigation of flooding Attack in MANET using NS-3
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.
Authors and Affiliations
Abhijeet kumar, Archana Bharti
A Survey on Classification Methodologies of Encryption Methods in Cloud
Cloud computing is a model for emerging convenient, on-demand access to shared pool of configurable computing resources. Cloud computing is modify the way of organizations manage their data. Privacy is main issues for s...
Design of web-based information systems– New challenges for systems development
The web-technology is going through major changes these years, both with respect to types of systems based on webtechnology, organization of the development work, required approaches and competencies, etc. We must rethin...
3D Development with WebGL
The WebGL API gives JavaScript developers the ability to tap directly into the powerful built-in 3D graphics acceleration capabilities of today's PC and mobile-device hardware. Supported transparently in modern browsers...
Predicting Churn In E-Mall Using Decision Tree
Different studies and reviews propose that for an organization, economically it is less feasible to connect with another new customer than to hold a current faithful customer. Churn foreseen models are produced by schol...
High throughput Architecture of Arithmetic Coder Used in SPIHT
In this paper we propose a high-throughput memory-efficient arithmetic coder architecture for the set partitioning in hierarchical trees(SPIHT) image compression is proposed based on a simple context model in this paper...