CFP last date
22 April 2024
Reseach Article

Detection and Prevention Scheme against Jamming Attack in MANET

by Namrata Soni, Vinay Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 11
Year of Publication: 2016
Authors: Namrata Soni, Vinay Singh
10.5120/ijca2016911991

Namrata Soni, Vinay Singh . Detection and Prevention Scheme against Jamming Attack in MANET. International Journal of Computer Applications. 154, 11 ( Dec 2016), 37-41. DOI=10.5120/ijca2016911991

@article{ 10.5120/ijca2016911991,
author = { Namrata Soni, Vinay Singh },
title = { Detection and Prevention Scheme against Jamming Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 154 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number11/26565-2016911991/ },
doi = { 10.5120/ijca2016911991 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:00.930098+05:30
%A Namrata Soni
%A Vinay Singh
%T Detection and Prevention Scheme against Jamming Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 11
%P 37-41
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Mobile Ad hoc Network nodes are established connection and deliver data in dynamic environment. Security is the one amongst the most important problem in Mobile ad hoc Network (MANET). Owing to distinctive characteristics of MANET, it creates variety of important challenges to its security design to beat the challenges, there's a desire to create a security scheme that achieves both in depth protection and fascinating network performance from attacks. In mobile ad hoc networks wherever the constellation animatedly changes, straight ways can't be used with efficiency. The various security schemes against attack are improves the network performance in presence of offender to disable misbehaviour activity. In this paper we tend to examine the behaviour of various attacks result in network. In this survey we majorly highlight the behavior of different attacks with specific consistence of Jamming attack and defense schemes in MANET. The multipath routing schemes is also discussed to improve the network performance in network but condition is that jamming condition are possible to occur by attacker. In presence of attacker security scheme are always provides the secure path then in multipath routing the possibility of secure routing is enhanced in presence of attacker and security scheme.

References
  1. S. Madhavi, “An Intrusion Detection System In Mobile Ad hoc Network”, International Journal of Security and Applications, Vol. 2, No. 3, pp. 1-16, July 2008.
  2. V. P. and R. P. Goyal, “MANET: Vulnerabilities Challenges Attacks Application”, IJCEM International journal of process Engineering & Management, Vol. 11, pp. 32-37, January 2011.
  3. N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, “Analyzing the Energy utilization of Security Protocols”, Departure on of International conference of Low Power Electronics and Design (ISLPED ’03), 2003.
  4. Elizabeth M. Royer and Chai-Keong Toh, “A analysis of existing Routing Protocols for ad hoc Mobile Wireless Networks”, IEEE pathetic Communications, Vol. 6, No. 2, pp. 46-55, April 1999.
  5. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, "Review of a variety of Routing Protocols for MANETS”, International Journal of Information and Electronics Engineering, Vol. 1, No. 3, pp. 251-259, November 2011.
  6. S. Ali Dorri, Seyed Reza Kamal and Esmail Kheyrkhah, “Security challenges in Mobile Ad-hoc Networks: A Survey”, International Journal of Computer Science and Engineering Survey (IJCSEC), Vol. 6, No. 1, pp. 15-29, February 2015.
  7. M. Mukesh and K.R. Rishi, “Security characteristic in Mobile ad hoc Network (MANETs): Technical Review”, International Journal of computer Applications, Vol. 12, pp. 37-43, December 2010.
  8. Yongguang Zhang and Winke Lee, “Security in Mobile Ad-Hoc Networks”, in volume ad hoc Networks technologies and Protocols (Chapter 9), Springer, 2005.
  9. P. Yi, Z. Dai, S. Zhang, Y. Zhong, “A New Routing Attack In Mobile ad hoc Networks”, International Journal of information technology, vol. 11, no. 2, pp. 83-94, 2005.
  10. P. Papadimitratos and Z. J. Hass, “Secure routing for Mobile ad hoc Networks”, in measures of SCS Communication Networks and Distributed Systems model and Simulation Conference (CNDS), san Antonio TX, January 2002.
  11. Amitabh Mishra and Ketan M. Nadkarni, “Security in Wireless ad hoc Networks”, in volume the instruction book of ad hoc Wireless Networks, CRC Press LLC, 2003.
  12. Aleksi Marttinen, Alexander M. Wyglinski and Riku Jantti, “Statistics-based jamming Detection algorithm for jamming Attacks Against considered MANETs”, IEEE Military Communications Conference, pp. 501-506, 2014.
  13. Hussein Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Member, IEEE, and Adrian Perrig, “Jamming-Resilient Multipath Routing”, IEEE Transactions on Dependable And Secure Computing, Vol. 9, No. 6, pp. 852-863, November/December 2012.
  14. Detection”, IEEE Transactions on Network and S Fenye Bao, Ing-Ray Chen, Moon Jeong Chang, and Jin-Hee Cho, “hierarchical dependence Management for Wireless sensor Networks and its Applications to Trust-Based Routing and Intrusion ervice Management, Vol. 9, No. 2, pp. 169-182, June 2012.
  15. Preeti Sachan, Pabitra Mohan Khilar, “Security Attacks and solution in MANET”, Proceedings of International Conference on Advances in computer Engineering, pp. 172-177, 2011 ACEEE.
  16. Pravina Dhurandher, “FACES: Friend based ad hoc Routing with challenge to establish security in MANET Systems”, IEEE SYSTEMS Journal, Vol. 5, No 2, pp. 176-188, June 2011..
  17. Yi Zhang, Qiang Liu, “A Instant DDOS Attack Detection and prevention System support per-IP transfer behavioral Analysis”, 3rd IEEE International Conference on Realistic Science and Information Technology (ICCSIT), pp. 163–167, 2010.
  18. Husain, Shahnawaz, Gupta S. C. Chand Mukesh, “Denial of Service Attack in AODV & Friend features mining to design Detection”, IEEE International Conference on computer & Communication Technology (ICCCT), pp. 292-297, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Security Attack Routing MANET Multipath