Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET

نویسندگان

  • Aparna Raj
  • Pankaj Kumar Vyas
چکیده

The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks, for example, In dynamic evolving topology, no incorporated/centralized control and so forth. Subsequently, accomplishing security objectives for mobile ad hoc network (MANET) has increased critical consideration of the scholarly world and research community in recent years. In MANET security is the major issues in which jamming is one of them. In this attack a jamming node falsely advertise shortest path to destination node and drop all data packet in it. This paper, majorly highlight the behavior of Jamming attack and proposed flooding based defense schemes IDS against jamming attack in MANET. The performance of proposed IDS provides the normal routing performance and proving secure alternative path in MANET. The proposed scheme is simulated using NS-2 network simulator and analysis is performed using performance metrics such as routing overhead, PDR, packet analysis etc. The experimental results of the proposed scheme give improved result which means our proposed scheme is more effective to make the network secure and combat it from jamming attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor

Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network

© 2015, IRJET.NETAll Rights Reserved Page 510 Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, India 2Rupinder Kaur, Assistant Professor, Department of Electronics and Communication Engineering, Patiala, Punjab, India --------...

متن کامل

A New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017