Advertisement

Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack

  • Avita Katal
  • Mohammad Wazid
  • R H Goudar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 236)

Abstract

Mobile ad hoc network is prone to denial of service attack. Jellyfish is a new denial of service attack and is categorized as JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. In JF Periodic Dropping Attack, intruder node intrudes into forwarding group and starts dropping packets periodically. Due to JF Periodic Dropping attack, the delay in the network increases and throughput decreases. In this paper a comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF Periodic Dropping attack is done. This work is specially done for multimedia transmission i.e. video and voice. If we have a mobile ad hoc network in which probability of occurrence of JF Periodic Dropping attack is high and also if it requires time efficient network multimedia service for information exchange then TORA protocol is to be chosen. If it requires high multimedia throughput and consistent service in the network then AODV protocol is recommended. An algorithm has been proposed depending upon the analysis done particularly for multimedia transmission in MANET which will help in choosing the best suited protocol for the required network parameters under JF Periodic Dropping attack.

Keywords

JF periodic dropping attack Multimedia transmission  AODV DSR TORA 

References

  1. 1.
    Begum, S. A., Mohan, L., Ranjitha, B.: Techniques for resilience of denial of service attacks in mobile ad hoc networks. In: Proceedings published by International Journal of Electronics Communication and Computer Engineering, vol. 3(1), NCRTCST, ISSN 2249–071X National Conference on Research Trends in Computer Science and Technology (2012)Google Scholar
  2. 2.
    Barkhodia, E., Singh, P., Walia, G. K.: Performance analysis of AODV using HTTP traffic under Black Hole Attack in MANET. Comput. Sci. Eng. Int. J. (CSEIJ) 2(3), (2012)Google Scholar
  3. 3.
    Jan, V. M., Welch, I., Seah, W. K. G: Security threats and solutions in MANETs: a case study using AODV and SAODV. Elsevier J. Netw. Comput. Appl. 35, 1249–1259 (2012)Google Scholar
  4. 4.
    Wazid, M., Singh, R. K., Goudar, R. H.: A survey of attacks happened at different layers of mobile ad-hoc network and some available detection techniques. In: Proceedings published by International Journal of Computer Applications (IJCA) International Conference on Computer Communication and Networks CSI- COMNET, Hawaii, Dec (2011)Google Scholar
  5. 5.
    Adam, G., Kapoulas, V., Bouras, C., Kioumourtzis, G., Gkamas, A., Tavoularis. N.: Performance evaluation of routing protocols for multimedia transmission over mobile ad hoc networks. In: IEEE International Conference on Wireless and Mobile Networking Conference (WMNC), (2011)Google Scholar
  6. 6.
    Jayasingh, B. B., Swathi, B.: A novel metric for detection of jellyfish reorder attack on ad hoc network. BVICAM’S Int. J. Inf. Technol. (BIJIT) 2(1), ISSN 0973–5658 (2010)Google Scholar
  7. 7.
    Ramesh, V., Subbaiah, P., Koteswar Rao, N., Subhashini, N., Narayana.D.: Performance comparison and analysis of preemptive-DSR and TORA. Int. J. Ad hoc, Sens. and Ubiquitous Comput. (IJASUC) 1(4) (2010)Google Scholar
  8. 8.
    Thakare, A. N., Joshi, M. Y.: Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks. IJCA Special Issue on Mobile Ad-hoc Networks MANETs (2010)Google Scholar
  9. 9.
    Cai, J., Yi, P., Tian, Y., Zhou, Y., Liu, N.: The simulation and comparison of routing attacks on DSR protocol. In: IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), Beijing, September (2009)Google Scholar
  10. 10.
    Amer, S. H., Hamilton, J. A.: DSR and TORA in fixed and mobile wireless networks. In: Proceedings of ACM-SE, ACM, Auburn, March (2008)Google Scholar
  11. 11.
    Alshanyour, A. M., Baroudi, U.: Bypass AODV: improving performance of ad hoc on- demand distance vector (AODV) routing protocol in wireless ad hoc networks. In: Proceedings of ACM Ambi-sys, ACM Digital Library, Quebec city, 11–14 Feb (2008)Google Scholar
  12. 12.
    Nguyen, H. L., Nguyen, U. T.: A study of different types of attacks on multicast in mobile ad hoc networks. Elsevier J. Ad Hoc Netw. 6, 32–46 (2008)Google Scholar
  13. 13.
    Aad, I., Hubaux, J.-P., Knightly, E. W.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom, Philadelphia, Sept 26–Oct 1 (2004)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of CSEGraphic Era UniversityDehradunIndia

Personalised recommendations