slugMitigation of flooding Attack in MANET using NS-3

Abstract

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and are mobile. These nodes can act as host/router or both at the same time. They can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self configuration ability, they can be deployed urgently without the need of any infrastructure. Internet Engineering Task Force (IETF) has MANET working group (WG) that is devoted for developing IP routing protocols. Routing protocols is one of the challenging and interesting research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR etc. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model .The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement− all increases, thus degrading the performance of MANET significantly.

Authors and Affiliations

Abhijeet kumar, Archana Bharti

Keywords

Related Articles

Analysis of Video/Image Steganography Using Encrypted Audio

Steganography is the art of transmitting data by hiding it in a cover medium. Video steganography where video frame is used as a cover media for hiding the data. Limitation of steganography is that amount of data that c...

A Study on Food and Feeding of Mabuya Multifasciata Fit Zinger in Darrang District

Mabuya multifasciata is a skink belonging to the family Scincidae. It exhibits a broad geographical range throughout Asia with little genetic differentiation across the range. It appears to have excellent dispersal abil...

Study on the Properties of Concrete by Using Super Absorbent Polymer

The use of super absorbent polymer (SAP) in concrete is confirmed to have many constructive effects on the properties of concrete in its both stages; fresh concrete and hardened concrete. This study focus on the use of...

Design and Optimization of Multiple Slots Microstrip Patch Antenna for Wireless Applications

Multiband Wang-shaped fractal antenna is obtained by applying fractal geometry .Initially a rectangular patch is taken and fractal geometry is applied. Two iterations of fractal geometry are applied to form double wang-...

slugAnalysis of Various Image Steganography Techniques

Steganography is an art and science of hiding the information into some carrier files without changing the visual properties of carrier file. In digital world, the carrier file can be text file, audio/video file, image...

Download PDF file
  • EP ID EP17985
  • DOI -
  • Views 471
  • Downloads 21

How To Cite

Abhijeet kumar, Archana Bharti (2014). slugMitigation of flooding Attack in MANET using NS-3. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17985