CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS

by Prachi Sharma, Kalpana Rai, Deepak Jain, B.L. Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 11
Year of Publication: 2016
Authors: Prachi Sharma, Kalpana Rai, Deepak Jain, B.L. Rai
10.5120/ijca2016909384

Prachi Sharma, Kalpana Rai, Deepak Jain, B.L. Rai . Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS. International Journal of Computer Applications. 139, 11 ( April 2016), 20-24. DOI=10.5120/ijca2016909384

@article{ 10.5120/ijca2016909384,
author = { Prachi Sharma, Kalpana Rai, Deepak Jain, B.L. Rai },
title = { Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 11 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number11/24534-2016909384/ },
doi = { 10.5120/ijca2016909384 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:40:39.874896+05:30
%A Prachi Sharma
%A Kalpana Rai
%A Deepak Jain
%A B.L. Rai
%T Hybrid Method for MANET Security against Jelly Fish, Blackhole and DoS
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 11
%P 20-24
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The word mobile indicates the meaning of moving and the word ad hoc indicates the meaning of temporary or do not have any type of constant infrastructure, therefore mobile-adhoc-networks implies the networks that are temporary and allows the nodes to move within the network without any centralized administration. In this paper, the concern is on security issues found in the MANET. Then certain criteria for the security of mobile-adhoc-network and some major types of attacks are discussed which are present in it. Mainly this paper is targeted on the attacks of jellyfish and their some types. Due to some special features of MANET such as hop-by-hop communications, dynamic topology and simple and fast setup, this network has suffered lots of issues like issues in security, routing and some clustering issues. Hence, this paper tries to work by focusing on mainly for maintaining the security in MANET and some TCP-based attacks it is facing. .

References
  1. Robinpreet Kaur & Mritunjay Kumar Rai, Department of Electronics and Engineering, Lovely Professional University, Phagwara,Punjab, India “A Novel Review on Routing Protocols in MANETs” under Undergraduate Academic Research Journal (UARJ), ISSN : 2278 -1129, Volume-1, Issue-1, 2012
  2. Dhamande C.S and Deshmukh H.R, “A Competent to diminish the brunt of gay hole attack in MANET”, Vol.2, Issue 2 Mar 2012.
  3. Q. Guan, F. Richard Yu, Shennimg Jing and Victor C.M Leung, “Joint Topology on Vehicular technology”, Vol.61, No.6, Jul 2012.
  4. S.a.A.k.G, H.o.d.R.m, and S. sharma, "A Comprehensive Review of Security Issues in Manets," International Journal of Computer Applications vol. 69, 2013.
  5. A.MISHRA, R. Jaiswal, and S. Sharma, " A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network," presented at the 3rd International Conference on Advance Computing Conference (IACC), 2013
  6. Supriya and M. Khari, "Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey," Advances in Computer Science and Information Technology, Networks and Communications Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 84, pp. 119-124, 2012.
  7. J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Wireless Telecommunications Symposium (WTS), 2012.
  8. R.H.Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS Attacks in Mobile Ad Hoc Networks: A Survey," presented at the Second International Conference on Advanced Computing & Communication Technologies (ACCT), 2012
  9. K.Sangeetha, “Secure Data Transmission in MANETS Using Eliptic Curve Cryptography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014, pp:2557-2562.
  10. Swati Pokhariyal, Pradeep Kumar, “A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets”, IJCSMC, Vol. 3, Issue. 12, December 2014, pg.217 – 223
  11. Harsh et al, “Cooperative Blackhole/ Grayhole Attack Prevention in Mobile Ad hoc Network: A Review”, International Journal of Computer Applications, Vol 64, Feb, 2013, pp. 16-22
  12. Mohammad Wazid, Roshan Singh Sachan, R H Goudar, “Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks using AODV Protocol”, Proc. Int. Conf. on Computational Intelligence and Information Technology, CIIT, 2012.
  13. Garg, S., & Chand, S. (2014, September), “Enhanced AODV protocol for defense against JellyFish Attack on MANETs”, In Advances in Computing, Communications and Informatics ICACCI, 2014 International Conference on (pp. 2279-2284). IEEE.
  14. Kaur, A., & Wadhwa, D. S. (2013). Effects of jelly fish attack on mobile ad-hoc network’s routing protocols. IJERA, 2248 (9622), 1694-1700.
  15. Patel, H. P., & Chaudhari, M. B. (2013, July), “A time space cryptography hashing solution for prevention Jellyfish Reordering attack in wireless ad hoc networks”, In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.
  16. Mohammad Wazid, Vipin Kumar, RH Goudar, “Comparative performance analysis of routing protocols in mobile ad-hoc network under Jelly fish attack”, 2nd IEEE International Conference on parallel, distributed and grid computing, 2012.
  17. Manjot Kaur, Malti Sarangal, Anand Nayyar , “Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks”, International Journal of Computer Trends and Technology (IJCTT) – volume 15 number 1 – Sep 2014
  18. S.S.Zalte, Prof.(Dr.)Vijay R.Ghorpade, “Secure Token for Secure Routing of Packet in MANET”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 6916-6919
Index Terms

Computer Science
Information Sciences

Keywords

Jelly Fish Black Hole MANET Attacks