CFP last date
20 May 2024
Reseach Article

Analysis of Jellyfish Reorder Attack on ZRP

by Priya Maheshwari, Leenu Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 9
Year of Publication: 2015
Authors: Priya Maheshwari, Leenu Singh
10.5120/19214-0935

Priya Maheshwari, Leenu Singh . Analysis of Jellyfish Reorder Attack on ZRP. International Journal of Computer Applications. 109, 9 ( January 2015), 5-7. DOI=10.5120/19214-0935

@article{ 10.5120/19214-0935,
author = { Priya Maheshwari, Leenu Singh },
title = { Analysis of Jellyfish Reorder Attack on ZRP },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 9 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number9/19214-0935/ },
doi = { 10.5120/19214-0935 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:19.526800+05:30
%A Priya Maheshwari
%A Leenu Singh
%T Analysis of Jellyfish Reorder Attack on ZRP
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 9
%P 5-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs are more susceptible to attacks than a wired network. High mobility, lack of central administration, etc. are some of the main causes. One of the DOS attacks known as Jellyfish Attack is difficult to analyze as well as to detect in MANETs as Jellyfisher nodes follow all the protocol rules. There are mainly three classes of jellyfish attacks named as a Jellyfish Reorder Attack, Jellyfish Periodic Dropping Attack and Jellyfish Delay Variance Attack. Jellyfish Reorder Attack is the most devastating attack amongst the three. The attacker node reorders the packet, and reduces the Goodput of destination to a certain level and increases the average End-to-End Delay. ZRP is the hybrid protocol in which each node forms its own zone. This paper is focused on analyzing the impact of the jellyfish reorder attack on the ZRP protocol by using NS2 as a simulator. The metrics used during the simulation are Goodput and End-to-End Delay.

References
  1. Garg, S. , & Chand, S. (2014, September). Enhanced AODV protocol for defense against JellyFish Attack on MANETs. In Advances in Computing, Communications and Informatics ICACCI, 2014 International Conference on (pp. 2279-2284). IEEE.
  2. Kaur, A. , & Wadhwa, D. S. (2013). Effects of jelly fish attack on mobile ad-hoc network's routing protocols. IJERA, 2248 (9622), 1694-1700.
  3. Patel, H. P. , & Chaudhari, M. B. (2013, July). A time space cryptography hashing solution for prevention Jellyfish Reordering attack in wireless ad hoc networks. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.
  4. Wazid, M. , Kumar, V. , & Gaudar, R. H. (2012). Comparative Performance Analysis Of Routing Protocols In Mobile Ad Hoc Networks Under Jellyfish Attack. In International Conference on Parallel, Distributed and Grid Computing On IEEE.
  5. Wazid, M. , Katal, A. , & Goudar, R. H. (2012, December). Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 435-440). IEEE.
  6. Jain, A. K. , & Tokekar, V. (2011, October). Classification of denial of service attacks in mobile ad hoc networks. In Computational Intelligence and Communication Networks (CICN), 2011 International Conference on (pp. 256-261). IEEE.
  7. Lakhtaria, K. I. (2010). Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter. arXiv preprint arXiv:1012. 2510.
  8. Jayasingh, B. B. , & Swathi, B. (2010). A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network. Bharati Vidyapeeth's Institute of Computer Applications and Management, 164.
  9. Nguyen, H. L. , & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6 (1), 32-46.
  10. Aad, I. , Hubaux, J. P. , & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. Networking, IEEE/ACM Transactions on, 16 (4), 791-802.
  11. Liu, K. , Deng, J. , Varshney, P. K. , & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. Mobile Computing, IEEE Transactions on, 6 (5), 536-550.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network ZRP Jellyfish Reorder Attack End-to-End Delay Goodput.