slugMitigation of flooding Attack in MANET using NS-3
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.
Authors and Affiliations
Abhijeet kumar, Archana Bharti
Review on Heat Transfer Enhancement Through Fins Using Surface Modifications
Extended surfaces are employed in many engineering applications such as heat exchanger, chemical reactor and micro-electronic devices; hence many techniques have been investigated on enhancement of heat transfer rate....
Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN
In terms of network security, spoofing is gaining illegitimate advantage by falsifying data. Spoofing can be done by a person or a program. Popularity of spoofing is increasing because of less precautions taken by appli...
A Model of Present Influencing Factors to Indian Human Resource Management
Human resource management is the concept of preplanned, centralized decision making process and it is different form older concepts like staffing and placement etc. People or HRM is the central power system of any organ...
Image Compression & Decompression using Discrete Wavelet Transform Approach
Image compression deals with reducing the amount of data required to represent a digital image. When multimedia data such as images, video and audio is not compressed then these data requires vast amount of computer sto...
Android Operating System
The android operating system is basically an operating system for mobiles and is rapidly gaining market share, with dozens of smart phones and tablets either released or set to be released. It is mobile operating system...