Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Prachi Sharma, Kalpana Rai, Deepak Jain, B.L. Rai

Prachi Sharma, Kalpana Rai, Deepak Jain and B L Rai. Article: Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS. International Journal of Computer Applications 139(11):20-24, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Prachi Sharma and Kalpana Rai and Deepak Jain and B.L. Rai},
	title = {Article: Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {11},
	pages = {20-24},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


The word mobile indicates the meaning of moving and the word ad hoc indicates the meaning of temporary or do not have any type of constant infrastructure, therefore mobile-adhoc-networks implies the networks that are temporary and allows the nodes to move within the network without any centralized administration. In this paper, the concern is on security issues found in the MANET. Then certain criteria for the security of mobile-adhoc-network and some major types of attacks are discussed which are present in it. Mainly this paper is targeted on the attacks of jellyfish and their some types. Due to some special features of MANET such as hop-by-hop communications, dynamic topology and simple and fast setup, this network has suffered lots of issues like issues in security, routing and some clustering issues. Hence, this paper tries to work by focusing on mainly for maintaining the security in MANET and some TCP-based attacks it is facing. .


  1. Robinpreet Kaur & Mritunjay Kumar Rai, Department of Electronics and Engineering, Lovely Professional University, Phagwara,Punjab, India “A Novel Review on Routing Protocols in MANETs” under Undergraduate Academic Research Journal (UARJ), ISSN : 2278 -1129, Volume-1, Issue-1, 2012
  2. Dhamande C.S and Deshmukh H.R, “A Competent to diminish the brunt of gay hole attack in MANET”, Vol.2, Issue 2 Mar 2012.
  3. Q. Guan, F. Richard Yu, Shennimg Jing and Victor C.M Leung, “Joint Topology on Vehicular technology”, Vol.61, No.6, Jul 2012.
  4. S.a.A.k.G, H.o.d.R.m, and S. sharma, "A Comprehensive Review of Security Issues in Manets," International Journal of Computer Applications vol. 69, 2013.
  5. A.MISHRA, R. Jaiswal, and S. Sharma, " A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network," presented at the 3rd International Conference on Advance Computing Conference (IACC), 2013
  6. Supriya and M. Khari, "Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey," Advances in Computer Science and Information Technology, Networks and Communications Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 84, pp. 119-124, 2012.
  7. J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Wireless Telecommunications Symposium (WTS), 2012.
  8. R.H.Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS Attacks in Mobile Ad Hoc Networks: A Survey," presented at the Second International Conference on Advanced Computing & Communication Technologies (ACCT), 2012
  9. K.Sangeetha, “Secure Data Transmission in MANETS Using Eliptic Curve Cryptography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014, pp:2557-2562.
  10. Swati Pokhariyal, Pradeep Kumar, “A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets”, IJCSMC, Vol. 3, Issue. 12, December 2014, pg.217 – 223
  11. Harsh et al, “Cooperative Blackhole/ Grayhole Attack Prevention in Mobile Ad hoc Network: A Review”, International Journal of Computer Applications, Vol 64, Feb, 2013, pp. 16-22
  12. Mohammad Wazid, Roshan Singh Sachan, R H Goudar, “Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks using AODV Protocol”, Proc. Int. Conf. on Computational Intelligence and Information Technology, CIIT, 2012.
  13. Garg, S., & Chand, S. (2014, September), “Enhanced AODV protocol for defense against JellyFish Attack on MANETs”, In Advances in Computing, Communications and Informatics ICACCI, 2014 International Conference on (pp. 2279-2284). IEEE.
  14. Kaur, A., & Wadhwa, D. S. (2013). Effects of jelly fish attack on mobile ad-hoc network’s routing protocols. IJERA, 2248 (9622), 1694-1700.
  15. Patel, H. P., & Chaudhari, M. B. (2013, July), “A time space cryptography hashing solution for prevention Jellyfish Reordering attack in wireless ad hoc networks”, In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.
  16. Mohammad Wazid, Vipin Kumar, RH Goudar, “Comparative performance analysis of routing protocols in mobile ad-hoc network under Jelly fish attack”, 2nd IEEE International Conference on parallel, distributed and grid computing, 2012.
  17. Manjot Kaur, Malti Sarangal, Anand Nayyar , “Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks”, International Journal of Computer Trends and Technology (IJCTT) – volume 15 number 1 – Sep 2014
  18. S.S.Zalte, Prof.(Dr.)Vijay R.Ghorpade, “Secure Token for Secure Routing of Packet in MANET”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6916-6919


Jelly Fish, Black Hole, MANET, Attacks