Skip to main content

Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 236))

  • 1688 Accesses

Abstract

Mobile ad hoc network is prone to denial of service attack. Jellyfish is a new denial of service attack and is categorized as JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. In JF Periodic Dropping Attack, intruder node intrudes into forwarding group and starts dropping packets periodically. Due to JF Periodic Dropping attack, the delay in the network increases and throughput decreases. In this paper a comparative performance analysis of three reactive routing protocols i.e. AODV, DSR and TORA used in mobile ad hoc network under JF Periodic Dropping attack is done. This work is specially done for multimedia transmission i.e. video and voice. If we have a mobile ad hoc network in which probability of occurrence of JF Periodic Dropping attack is high and also if it requires time efficient network multimedia service for information exchange then TORA protocol is to be chosen. If it requires high multimedia throughput and consistent service in the network then AODV protocol is recommended. An algorithm has been proposed depending upon the analysis done particularly for multimedia transmission in MANET which will help in choosing the best suited protocol for the required network parameters under JF Periodic Dropping attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Begum, S. A., Mohan, L., Ranjitha, B.: Techniques for resilience of denial of service attacks in mobile ad hoc networks. In: Proceedings published by International Journal of Electronics Communication and Computer Engineering, vol. 3(1), NCRTCST, ISSN 2249–071X National Conference on Research Trends in Computer Science and Technology (2012)

    Google Scholar 

  2. Barkhodia, E., Singh, P., Walia, G. K.: Performance analysis of AODV using HTTP traffic under Black Hole Attack in MANET. Comput. Sci. Eng. Int. J. (CSEIJ) 2(3), (2012)

    Google Scholar 

  3. Jan, V. M., Welch, I., Seah, W. K. G: Security threats and solutions in MANETs: a case study using AODV and SAODV. Elsevier J. Netw. Comput. Appl. 35, 1249–1259 (2012)

    Google Scholar 

  4. Wazid, M., Singh, R. K., Goudar, R. H.: A survey of attacks happened at different layers of mobile ad-hoc network and some available detection techniques. In: Proceedings published by International Journal of Computer Applications (IJCA) International Conference on Computer Communication and Networks CSI- COMNET, Hawaii, Dec (2011)

    Google Scholar 

  5. Adam, G., Kapoulas, V., Bouras, C., Kioumourtzis, G., Gkamas, A., Tavoularis. N.: Performance evaluation of routing protocols for multimedia transmission over mobile ad hoc networks. In: IEEE International Conference on Wireless and Mobile Networking Conference (WMNC), (2011)

    Google Scholar 

  6. Jayasingh, B. B., Swathi, B.: A novel metric for detection of jellyfish reorder attack on ad hoc network. BVICAM’S Int. J. Inf. Technol. (BIJIT) 2(1), ISSN 0973–5658 (2010)

    Google Scholar 

  7. Ramesh, V., Subbaiah, P., Koteswar Rao, N., Subhashini, N., Narayana.D.: Performance comparison and analysis of preemptive-DSR and TORA. Int. J. Ad hoc, Sens. and Ubiquitous Comput. (IJASUC) 1(4) (2010)

    Google Scholar 

  8. Thakare, A. N., Joshi, M. Y.: Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks. IJCA Special Issue on Mobile Ad-hoc Networks MANETs (2010)

    Google Scholar 

  9. Cai, J., Yi, P., Tian, Y., Zhou, Y., Liu, N.: The simulation and comparison of routing attacks on DSR protocol. In: IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), Beijing, September (2009)

    Google Scholar 

  10. Amer, S. H., Hamilton, J. A.: DSR and TORA in fixed and mobile wireless networks. In: Proceedings of ACM-SE, ACM, Auburn, March (2008)

    Google Scholar 

  11. Alshanyour, A. M., Baroudi, U.: Bypass AODV: improving performance of ad hoc on- demand distance vector (AODV) routing protocol in wireless ad hoc networks. In: Proceedings of ACM Ambi-sys, ACM Digital Library, Quebec city, 11–14 Feb (2008)

    Google Scholar 

  12. Nguyen, H. L., Nguyen, U. T.: A study of different types of attacks on multicast in mobile ad hoc networks. Elsevier J. Ad Hoc Netw. 6, 32–46 (2008)

    Google Scholar 

  13. Aad, I., Hubaux, J.-P., Knightly, E. W.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom, Philadelphia, Sept 26–Oct 1 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avita Katal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Katal, A., Wazid, M., Goudar, R.H. (2014). Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack . In: Babu, B., et al. Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1602-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1602-5_45

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1601-8

  • Online ISBN: 978-81-322-1602-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics