Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Aparna Raj, Pankaj Kumar Vyas

Aparna Raj and Pankaj Kumar Vyas. Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET. International Journal of Computer Applications 167(4):31-36, June 2017. BibTeX

	author = {Aparna Raj and Pankaj Kumar Vyas},
	title = {Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {4},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {31-36},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017914243},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks, for example, In dynamic evolving topology, no incorporated/centralized control and so forth. Subsequently, accomplishing security objectives for mobile ad hoc network (MANET) has increased critical consideration of the scholarly world and research community in recent years. In MANET security is the major issues in which jamming is one of them. In this attack a jamming node falsely advertise shortest path to destination node and drop all data packet in it. This paper, majorly highlight the behavior of Jamming attack and proposed flooding based defense schemes IDS against jamming attack in MANET. The performance of proposed IDS provides the normal routing performance and proving secure alternative path in MANET. The proposed scheme is simulated using NS-2 network simulator and analysis is performed using performance metrics such as routing overhead, PDR, packet analysis etc. The experimental results of the proposed scheme give improved result which means our proposed scheme is more effective to make the network secure and combat it from jamming attack.


  1. S. Madhavi, “An Intrusion Detection System In Mobile Ad hoc Network”, International Journal of Security and Applications, Vol. 2, No. 3, pp. 1-16, July 2008.
  2. V. P. and R. P. Goyal, “MANET: Vulnerabilities Challenges Attacks Application”, IJCEM International journal of process Engineering & Management, Vol. 11, pp. 32-37, January 2011.
  3. N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, “Analyzing the Energy utilization of Security Protocols,” Departure on of International conference of Low Power Electronics and Design (ISLPED ’03), 2003.
  4. Elizabeth M. Royer, Chai-Keong Toh, "A analysis of existing Routing Protocols for ad hoc Mobile Wireless Networks", IEEE pathetic Communications, Vol. 6, No. 2, pp. 46-55, April 1999.
  5. 5 Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, "Review of a variety of Routing Protocols for MANETS” , International Journal of Information and Electronics Engineering, Vol. 1, No. 3, pp. 251-259, November 2011.
  6. P. Yi, Z. Dai, S. Zhang, Y. Zhong, “A New Routing Attack In Mobile ad hoc Networks”, International Journal of information technology, vol. 11, no. 2, pp. 83-94, 2005.
  7. Yongguang Zhang and Winke Lee, “Security in Mobile Ad-Hoc Networks”, In volume ad hoc Networks technologies and Protocols (Chapter 9), Springer, 2005.
  8. P. Papadimitratos and Z. J. Hass, “Secure routing for Mobile ad hoc Networks”, In measures of SCS Communication Networks and Distributed Systems model and Simulation Conference (CNDS), san Antonio TX, January 2002.
  9. Amitabh Mishra and Ketan M. Nadkarni, “Security in Wireless Ad hoc Networks”, In volume the instruction book of ad hoc Wireless Networks, CRC Press LLC, 2003.
  10. Aleksi Marttinen, Alexander M. Wyglinski, Riku Jantti, "Statistics-based jamming Detection algorithm for jamming Attacks Against considered MANETs", IEEE Military Communications Conference, pp. 501-506, 2014.
  11. Hussein Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Member, IEEE, and Adrian Perrig, “Jamming-Resilient Multipath Routing”, IEEE Transactions on Dependable And Secure Computing, Vol. 9, No. 6, pp. 852-863, November/December 2012.
  12. Fenye Bao, Ing-Ray Chen, Moon Jeong Chang, and Jin-Hee Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection”, IEEE Transactions On Network And Service Management, Vol. 9, No. 2, pp. 169-182, June 2012.
  13. Preeti Sachan, Pabitra Mohan Khilar, “Security Attacks and solution in MANET”, Proceedings of International Conference on Advances in computer Engineering, pp. 172-177, 2011 ACEEE.
  14. Pravina Dhurandher, “FACES: Friend based ad hoc Routing with challenge to establish security in MANET Systems”, IEEE SYSTEMS Journal, Vol. 5, No 2, pp. 176-188, June 2011.
  15. Soneram verma1, Prof. Maya Yadav 2016 “Detection and Prevention for Jamming Attack in MANET using TAODV Protocol”, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 05.
  16. Pawani Popli1, Paru Raj 2016. Mitigation of Jamming Attack in Mobile Ad Hoc Networks”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 6.
  17. Ashwini Magardey, Dr. Tripti Arjariya 2013. Secure Detection and Prevention Scheme for Jamming Attack in MANET, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
  18. Loukas Lazos, Sisi Liu, and Marwan Krunz “Mitigating Control-Channel Jamming Attacks in Multi-channel Ad Hoc Networks”, WiSec’09, March 16–18, 2009, Zurich, Switzerland 2009 ACM 978-1-60558-460.
  19. R. Dorus, P. Vinoth “Mitigation of jamming attacks in wireless network “,Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on Date of Conference: 25-26 March 2013.
  20. Yu Seung Kim, Frank Mokaya, Eric Chen, and Patrick Tague 2012. All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack, IEEE-2012.
  21. Data Integrity, from Wikipedia, the free encyclopedia,


Security, Jamming attack, IDS, Routing, MANET, NS-2