Secure Detection and Prevention Scheme for Jamming Attack in MANET
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Ashwini Magardey; Tripti Arjariya;
Page : 422-426
Keywords : Routing; Jamming attack; IDS; AOMDV; MANET;
Abstract
In MANET, secure routing is the major issue and it is difficult to identify malicious hosts as the topology of the network dynamically changes. In this paper we proposed the security scheme against jamming attack with AOMDV protocol. The proposed IDS scheme is identified the jammer attacker through the flooding of number of misbehavior control packets. These control packets are only consumes the network bandwidth and after some time it blocks the whole channel. Because of the mobility of the ad hoc network, a compromised node can frequently change its attack target and perform malicious behavior to different node in the network, thus it is very difficult to track the malicious routing behavior performed by a compromised node in network but the proposed scheme is identified it without any overhead in routing performance. The proposed IDS (Intrusion Detection System) security scheme is identified the attacker by their routing entry present on other nodes routing record. The attacker has dump the whole performing of network. The Multipath routing protocol AOMDV is provides the multiple path if the attacker is exist in established path. The infection from attack and performance metrics like throughput, routing load is evaluated and observe the secure proposed security scheme is immobilized the routing misbehavior of jamming attacker and provides secure AOMDV routing performance as equal to normal AOMDV performance.
Other Latest Articles
- A New Septate Gregarine (Apicomplexa: Sporozoa) from an Agricultural Pest of Imphal Valley, Manipur, India
- Simulation of Fuzzy Controller Based PFC Cuk Converter Fed BLDC Motor Drive
- Tribological and Mechanical Behaviour of Molybdenum Thin Film Nanocoatings Prepared by Magnetron Sputtering
- Optimistic Analysis of Processor Using FFT Equation Execution
- Analysis and Design of Skew Bridges
Last modified: 2021-06-30 21:44:39