Mitigation for Jelly Fish Attack on MANET

Shweta Shah*, Madhu Sharma**, Ashish Jain***
* Postgraduate, Institute of Engineering and Technology, DAVV, Indore, India.
** Postgraduate, Institute of Engineering and Technology, DAVV, Indore, India.
*** Research Scholar, Institute of Engineering and Technology, DAVV, Indore, India.
Periodicity:November - January'2016
DOI : https://doi.org/10.26634/jmt.2.4.6048

Abstract

Mobile Adhoc Networks have become a part and parcel of technology advancements due to its extraordinary technique. Open communication feature make it prone for various security threats. Subsequently, there are many security threats like DDOS, Wormhole, Black hole etc., which not only affect the network performance but also responsible for the leakage of sensitivity of information. Jelly-Fish attack is one of the routing disruption attack which lies in the series of wormhole and black hole attack at network layer. It attempts to compromise the network packet and store them for a period of time. It may try to introduce delay or partial capturing of packets during communication. Due to big impact of jellyfish attack, it has gained a big name in recently and most wide area for researchers. Jellyfish Attack exploits the end-to-end communication and creates congestion in transmission protocols. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to information leakage. Security in mobile networks is a challenging task. The complete study observes that the security threats not only capture the packets but also degrades the network performance. To overcome vulnerability problems, this work considers jellyfish attack as the study target and will derive a mechanism to identify and prevent mobile networks from security threats.

Keywords

MANETs, Security, Jellyfish Attack.

How to Cite this Article?

Shah, S., Sharma, M., and Jain, A. (2016). Mitigation for Jelly Fish Attack on MANET. i-manager’s Journal on Mobile Applications and Technologies, 2(4), 19-25. https://doi.org/10.26634/jmt.2.4.6048

References

[1]. Atul Kahate, (2003). Cryptography and Network Security, Second Edition-2003, Tata McGraw Hill N
[2]. Manjot Kaur and Malti Rani, (2014). “A Novel Defense Mechanism via Genetic Algorithm for Counterfeiting and Combating Jelly Fish Attack in Mobile Ad- Hoc Networks”. IEEE.
[3]. Amneet Kaur and Prabhneet Sandhu, (2014). “Comparison of AODV, OLSR, and TORA in MANET Under Jelly Fish Attack”. IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1, No. 5.
[4]. Avani Sharma, Rajbir Kaur and Purnendu Karmakar†, (2014). “JFDV Attack: Influence on Workability of Mobile Ad-hoc Networks”. CICSYN’14 Proceedings of the 2014 sixth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 170-175.
[5]. S. Marti, T. Guili, K. Lai, and M. Baker, (2000). “Mitigating routing misbehavior in mobile ad hoc networks”. In Proceedings of MOBICOM 2000.
[6]. H. Yang, J. Shu, X. Meng, and S. Lu, (2006). “SCAN: Self-organized network-layer security in mobile ad hoc networks”. IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2.
[7]. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, (2003). “Prevention of cooperative black hole attack in wireless ad hoc networks”. In Proceedings of 2003 International Conference on Wireless Networks (ICWN'03), pp. 570-575.
[8]. Piyush Agrawal, R. K. Ghosh, and Sajal K. Das, (2008). “Cooperative Black and Gray Hole Attacks in Mobile Ad nd Hoc Networks”. In Proceedings of the 2 international Conference on Ubiquitous Information Management and Communication, pp. 310-314.
[9]. Nadeem and M. Howarth, (2011). “Protection of MANETs from a range of attacks using an intrusion detection & prevention system”. Springer Science and Business Media, Vol. 146, No. 14.
[10]. H. Deng, H. Li, and D.P. Agrawal, (2002). “Routing security in wireless adhoc networks”. IEEE Communications Magazine, Vol. 40, No. 10.
[11]. M. Jackobsson, J. Hubaux, and L. Buttyan, (2003). “A micro-payment scheme encouraging collaboration in multi-hop cellular networks”. In Proceedings of Financial Crypto, pp. 15-33.
[12]. Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., and Tolle, J. (2007). “Detecting black hole attack in tactical MANETs using topology graph”. In Proceeding of nd 32 IEEE Conference on Local Computer Networks.
[13]. Retrieved from www.Scalable-networks.com
[14]. Programmers Documentation of Qualnet by Scalable Networks version 5.2, 2012.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.