DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Author(s):
Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Keywords:
AODV, end to end delay, Jellyfish Attacks, Mobile Ad-hoc Network.
Abstract
An ad hoc network is anaccumulation of wireless mobile nodes dynamically forming a tentative network without the use of any existing network infrastructure or medication administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops" may be needed for one node to transpositionof data with another node across the network. In recent years, wireless ad hoc networks (WANETs) have become very in-vogue due to their wide range of petition and their ability to be deployed under normal and rugged conditions while supporting high data rates. Although many intrusion detection and trust-based systems have been developed to protect ad hoc networks against misconduct such as rushing attacks, query-flood attacks, and selfishness of nodes, these aegis mechanisms are still not able to detect protocol compliant attacks called Jellyfish (JF) attacks. They target closed-loop flows such as TCP that are responsive to network conditions like delay and packet losses and can easily partition the network. In this paper, we introduce a technique which can be used to detect and detain Jellyfish delay variance attacks in ad hoc networks
Article Details
Unique Paper ID: 143374

Publication Volume & Issue: Volume 2, Issue 11

Page(s): 26 - 33
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews