DETECTION AND PREVENTION TECHNIQUE FROM JELLYFISH DELAY VARIANCE ATTACK
Author(s):
Kunjal Brahmbhatt , Ashish Patel, Hardik Prajapati
Keywords:
AODV, end to end delay, Jellyfish Attacks, Mobile Ad-hoc Network.
Abstract
An ad hoc network is anaccumulation of wireless mobile nodes dynamically forming a tentative network without the use of any existing network infrastructure or medication administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops" may be needed for one node to transpositionof data with another node across the network. In recent years, wireless ad hoc networks (WANETs) have become very in-vogue due to their wide range of petition and their ability to be deployed under normal and rugged conditions while supporting high data rates. Although many intrusion detection and trust-based systems have been developed to protect ad hoc networks against misconduct such as rushing attacks, query-flood attacks, and selfishness of nodes, these aegis mechanisms are still not able to detect protocol compliant attacks called Jellyfish (JF) attacks. They target closed-loop flows such as TCP that are responsive to network conditions like delay and packet losses and can easily partition the network. In this paper, we introduce a technique which can be used to detect and detain Jellyfish delay variance attacks in ad hoc networks
Article Details
Unique Paper ID: 143374

Publication Volume & Issue: Volume 2, Issue 11

Page(s): 26 - 33
Article Preview & Download




Go To Issue



Call For Paper

Volume 5 Issue 2

Last Date 25 July 2018


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Contact Details

Telephone:704 821 9842/43
Email: editor@ijirt.org
Website: ijirt.org