Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network
نویسندگان
چکیده
© 2015, IRJET.NETAll Rights Reserved Page 510 Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, India 2Rupinder Kaur, Assistant Professor, Department of Electronics and Communication Engineering, Patiala, Punjab, India ------------------------------------------------------------------------------------------------------------------------------------Abstract-MANET is a mobile Adhoc network. It is self-configuring network which is infrastructure less in nature. In MANET different nodes are connected through wireless links. Each node is free to move i.e. no central controller is available. There are several types of attacks in MANETs like jamming, selective packet drop attack etc. In this paper we will discuss about jamming attack. A novel technique will be proposed to detect and isolate jamming attack. Experimental results show that proposed technique is more efficient than the existing one.
منابع مشابه
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کامل