AODV, end to end delay, Jellyfish Attacks, Mobile Ad-hoc Network.
An ad hoc network is anaccumulation of wireless mobile nodes dynamically forming a tentative network without the use of any existing network infrastructure or medication administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops" may be needed for one node to transpositionof data with another node across the network. In recent years, wireless ad hoc networks (WANETs) have become very in-vogue due to their wide range of petition and their ability to be deployed under normal and rugged conditions while supporting high data rates. Although many intrusion detection and trust-based systems have been developed to protect ad hoc networks against misconduct such as rushing attacks, query-flood attacks, and selfishness of nodes, these aegis mechanisms are still not able to detect protocol compliant attacks called Jellyfish (JF) attacks. They target closed-loop flows such as TCP that are responsive to network conditions like delay and packet losses and can easily partition the network. In this paper, we introduce a technique which can be used to detect and detain Jellyfish delay variance attacks in ad hoc networks