Review On Jelly Fish Detection and Prevention Schemes in Manets
نویسندگان
چکیده
The Mobile ad Hoc Networks work for number of applications in the present times. Some of the uses require quick transmission of the data from an emergency disaster prone area to the help centers. If the objective of least end to end delay between the transmissions is defeated for the delay sensitive applications, then it could lead to more harm. Jelly Fish attack is one such kind of many possible attacks leading to the delay in the transmission of the packets. This paper reflects the idea of jelly fish attack and various techniques concerning its identification and prevention.
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملBeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملDynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...
متن کاملExploring Intrusion Detection Schemes and their Comparison in MANETs
The feasibility of mobile ad hoc networks (MANETs) is gaining popularity widely. Due to its fundamental characteristics like dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth, these networks are more prone to malicious attacks. The prevention methods like encryption and cryptography are not sufficient to make them secure. The reason behind this is tha...
متن کاملDistributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
In cognitive radio mobile ad hoc networks (CR-MANETs), secondary users can cooperatively sense the spectrum to detect the presence of primary users. In this chapter, we propose a fully distributed and scalable cooperative spectrum sensing scheme based on recent advances in consensus algorithms. In the proposed scheme, the secondary users can maintain coordination based on only local information...
متن کامل