Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks
Manjot Kaur , Malti Sarangal , Anand Nayyar ."Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks". International Journal of Computer Trends and Technology (IJCTT) V15(1):20-22, Sep 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
The advancement in Wireless Communication have given arise to various Wireless Networks like Mobile Adhoc Networks (MANETS), Wireless Sensor Networks and many more. MANET networks are vulnerable to various types of attacks and threats due to its unique characteristics like dynamic topology, Shared physical medium, distributed operations and many more. There are many attacks which effect the functioning of MANETS’ such as denial of service which is most commonly used to affect the network is one of the types of attacks in MANETS. Jellyfish attack has gained its name recently in attack scenario in Mobile Ad hoc networks. JellyFish Attack exploits the end to end congestion control mechanism of Transmission Control Protocol (TCP).
References
[1] Aad and J.P. Hubaux, E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks”, IEEE/ACM Transactions on Netwroking,vol.16,pp.791- 802,Aug.2008.
[2] Dhiman Deepika, Nayyar Anand, “Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs”,in Journal Proceedings of the IJARCSEE Volume 3, Issue 10, October 2013
[3] Hetal P. Patel, Prof. Minubhai. B. Chaudhari, "Survey: Impact of Jellyfish On Wireless Ad-Hoc Network", in proceeding of INJCR’10, Volume.10, issue.5, no.2pp. 5-9, 2010
[4] Hepikumar R. Khirasariya, "Simulation Study of Jellyfish Attack in MANET (mobile ad hoc network) using AODV Routing Protocol", in proceeding of AISec’10, pp. 1-3, 2010
[5] Kaur Manjot, Nayyar Anand “A Comprehensive Review of Mobile Adhoc Networks (MANETS)” in International Journal of Emerging Trends & Technology in Computer Science (ISSN2278-6856), Volume 2, Issue 6, November - December 2013
[6] Perkins CE, Royer EM, Das SR. Ad hoc on-demand distance vector (AODV) routing, IETF internet draft. MANET Working Group; Jan 2004.
[7] Perkins, C.: AODV routing implementation for scalable wireless ad-hoc network simulation (SWANS). http://jist.ece.cornell.edu/docs/040421-swans-ao
[8] I.Aad and J.P.Hubaux , E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks” , IEEE/ACM Transactions on Networking , vol.16 pp.791-802, Aug 2008
Keywords
Put your keywords here, keywords are separated by comma.