Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Print
PDF
IJCA Special Issue on Wireless Communication and Mobile Networks
© 2012 by IJCA Journal
wcmn - Number 1
Year of Publication: 2012
Authors:
Nidhi Purohit
Richa Sinha
Hiteishi Diwanji

Nidhi Purohit, Richa Sinha and Hiteishi Diwanji. Article: Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3. IJCA Special Issue on Wireless Communication and Mobile Networks wcmn(1):42-46, January 2012. Full text available. BibTeX

@article{key:article,
	author = {Nidhi Purohit and Richa Sinha and Hiteishi Diwanji},
	title = {Article: Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3},
	journal = {IJCA Special Issue on Wireless Communication and Mobile Networks},
	year = {2012},
	volume = {wcmn},
	number = {1},
	pages = {42-46},
	month = {January},
	note = {Full text available}
}

Abstract

Wireless networks are gaining popularity to its peak today, as the user’s wants wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). The attacks studied in this paper are against the routing protocols in Mobile ad hoc network. We have used AODV for simulating this attacks using NS3. Black hole attack is one of the security threat in which the traffic is redirected to such a node that drops all the packets or the node actually does not exist in the network. Black holes refer to places in the network where incoming traffic is silently discarded or dropped. Jellyfish (JF) attack is a type of selective black hole attack. When JF node gets hold of forwarding packet it starts delaying/dropping data packets for certain amount of time before forwarding normally. Since packet loss is common in mobile wireless networks, the attacker can exploit this fact by hiding its malicious intents using compliant packet losses that appear to be caused by environmental reasons

References

  • Perkins, Charles E, “Ad Hoc Networking,” Addison-Wesley, 2001.
  • Suma R, Sridevi K N, Mozil M , Mungara J.N ,Sethi P, “Random-Cast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks,” European Journal of Scientific Research,2011
  • T. Karygiannis and L. Owens, “Wireless Network Security, 802.11, Bluetooth and Handheld Devices,” NIST Publication, p. 800(48), November 2002
  • Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz,“A review of routing protocols for mobile ad hoc networks”, Technical report, Telecommunication and Information Research Institute, University of Wollongong, Wollongong, NSW 2522; Motorola Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia, 2003.
  • C. Perkins and P Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing DSDV for mobile computers”, In ACM SIGCOMM’94 Conference on Communication Architectures, protocols and applications, 1994
  • C.E. Perkins, E. Belding Royer, and S.R. Das, “Ad hoc On demand distance vector (AODV) routing”, IETF RFC 3561, July 2003
  • D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007
  • Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker,
  • “Mitigating routing misbehavior in mobile ad hoc networks”, International Conference on Mobile Computing and Networking, Proceedings of the 6th annual international conference on Mobile computing and networking, 2000, Boston, Massachusetts
  • P. Sankareswary, R. Suganthi, G.Sumathi, “Impact of selfish nodes in multicast Ad hoc on demand Distance Vector Protocol”, in Wireless Communication and Sensor Computing, 2010
  • A. Babakhouya, Y. Challal, and A. Bouabdallah, "A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks", in Proc. of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, September 2008
  • V. Gupta, S. Krishnamurthy, and M. Faloutsos, .Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks,. in Proc. of IEEE MILCOM ’02, 2002
  • NS -3 manual (Release ns-3.11)
  • Irshad Ullah and Shoaib ur Rehman, “ Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols”
  • B. B. Jayasingh and B. Swathi, “A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network”, BVICAM’S International Journal of Information Technology
  • Satyanarayana Vuppala, Alokparna Bandyopadhyay, Prasenjit Choudhury and Tanmay De, “A Simulation Analysis of Node Selfishness in MANET using NS-3”
  • Fei Xing Wenye Wang, “Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks”
  • Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007
  • Moitreyee Dasgupta, S. Choudhury, N. Chaki, “Routing Misbehavior in Ad Hoc Network”, International Journal of Computer Applications,2010
  • Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”
  • Imad Aad,y JeanPierre ,Hubaux,y and Edward W. Knightly, “Denial of Service Resilience in Ad Hoc Networks”
  • RFC 3561: Ad hoc on demand Routing protocol
  • E. A .Mary Anita and V. Vasudevan “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining”, International Journal of Computer Applications.