Various Attacks Including JellyFish Attack Along With Security Issues In Manet

Abstract

The MANET which is termed as Mobile Adhoc network works like a wireless network with unrestricted mobility and without any infrastructure. To design a new security mechanism for MANET various attack variations as well as their characteristics must be known. This paper studies distinct kinds of attacks namely - Data traffic attacks, Jelly Fish Attacks, Jelly Fish recorder Attack, Black Hole Attack, Gray Hole. The paper study mainly focuses on the jellyfish attack and its type. The paper also brief various techniques developed to detect and prevent from jellyfish attack.

Authors and Affiliations

Devesh Tedia, Umesh kumar Lilhore

Keywords

Related Articles

Social Engineering: Attack, Prevention and Framework

Social Engineering is the act of breaking security by manipulating users/individuals into divulging confidential information. It uses psychological tricks to gain trust, rather than technical cracking techniques. Social...

Closed Loop Control for Fast Varying Dynamic Load with Transient Free TBSC Compensator

Topology for reactive power compensation suitable for dynamic loads in closed loop is presented. The scheme consists of Thyristor Binary Switched Capacitor (TBSC) banks. TBSC is based on a chain of Thyristor Switched Ca...

Decision Making to Evaluate Interpersonal Skills Based on Similarity Checking using Artificial Intelligence

In this paper, we proposed a method to solve the problem related to the team formation and influence of the team performance among the students. Group formation could be a key aspect in computer-supported cooperative le...

 - Splitting Graphs

Let G(V,E) be a graph. A dominating set is a subset S of V such that every vertex not in S is adjacent to at least one vertex in S. The cardinality of a minimum dominating set is called the domination number, (G). A do...

A Review on Digital Image Scrambling Encryption Techniques

Digital image scrambling encryption technology is a way of securing digital image information. With the use of transformation techniques, it can change the original image into a disordered one beyond recognition, making...

Download PDF file
  • EP ID EP22388
  • DOI -
  • Views 212
  • Downloads 3

How To Cite

Devesh Tedia, Umesh kumar Lilhore (2016). Various Attacks Including JellyFish Attack Along With Security Issues In Manet. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(7), -. https://europub.co.uk/articles/-A-22388