CFP last date
20 March 2024
Reseach Article

Efficient Detection and Prevention of Jamming Attack in MANET

by Ashwinder Kaur, Abhilash Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 3
Year of Publication: 2015
Authors: Ashwinder Kaur, Abhilash Sharma
10.5120/ijca2015906788

Ashwinder Kaur, Abhilash Sharma . Efficient Detection and Prevention of Jamming Attack in MANET. International Journal of Computer Applications. 129, 3 ( November 2015), 17-21. DOI=10.5120/ijca2015906788

@article{ 10.5120/ijca2015906788,
author = { Ashwinder Kaur, Abhilash Sharma },
title = { Efficient Detection and Prevention of Jamming Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 3 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number3/23054-2015906788/ },
doi = { 10.5120/ijca2015906788 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:26.174993+05:30
%A Ashwinder Kaur
%A Abhilash Sharma
%T Efficient Detection and Prevention of Jamming Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 3
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Jamming attack is main problem and this can affect the network by various ways. Sometimes jammer retransmits messages to create jam over network or sometimes jammers are radio jammer which disturbs communication by decreasing the signal to noise ratio. In previous researches various techniques are discussed to detect jamming. One way is to check the signal busy ratio. If channel is busy for long time that means there is a jam on network or it can be check by checking the threshold value. If threshold value exceeds up to some limit then there expect some jam on network. When the jam will detected then check will be performed on the node which will be creating jam. Node identity will be checked by calculating the distance and the message of that node will be checked to detect the retransmission and replays. If sequence number will same than attacker will be detected but if sequence number is different message content will be checked. To check the reason of retransmissions an additional message will be send to destination so that if re-transmissions are due to the network failure it can be detected.

References
  1. Ismail, Z., Hassan, R. “Effects of Packet Size on AODV Routing Protocol Implementation in Homogeneous and Heterogeneous MANET” Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2011, pp. 351 – 356
  2. Thorat, S.A., Kulkarni, P.J. “Design issues in trust based routing for MANET” International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2014,pp. 1 – 7.
  3. Durai, K.N., Baskaran, K. “Energy efficient random cast DSR protocol with mediation device in MANET” International Conference on Advanced Computing and Communication Systems (ICACCS), 2013, pp. 1 – 5.
  4. Sheikh, R., Singh Chande, M., Mishra, D.K. “Security issues in MANET: A review” Seventh International Conference On Wireless And Optical Communications Networks (WOCN), 2010, pp. 1 – 4
  5. Rahman, F.M., Gregory, M.A. “4-N intelligent MANET routing algorithm” Australasian Telecommunication Networks and Applications Conference (ATNAC), 2011, pp. 1 – 6.
  6. Shah, N., Depei Qian “Cross-Layer Design to Merge Structured P2P Networks over MANET” 16th International Conference on Parallel and Distributed Systems (ICPADS), 2010,pp. 851 – 856.
  7. Moradi, Z.,Teshnehlab, M., Rahmani, A.M. “Implementation of neural networks for intrusion detection in manet” International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), 2011, pp. 1102 – 1106.
  8. Capt. Dr. S. Santhosh Baboo and Mr. V J Chakravarthy, “An Improvement In Congestion Control Using Multipath Routing In MANET – Right Angled And Ant Search Protocol (RAAA)” The International Journal of Computer Science & Applications (TIJCSA), Volume 2,2010,pp. 45-49.
  9. Vicomsoft, “Knowledge share whitepapers wireless networking Q&A”, Vicomsoft connect and protect, Jan 2003.
  10. Wikipedia, “The free encyclopedia-, Mobile ad-hocNetwork”, http://en.wikipedia.org/wiki/Mobile_ad-hoc_ network, Oct-2004.
  11. Charles E.Perkins and Elizabeth M. Royer, “Ad hoc on demand distance vector (AODV) routing (Internet-Draft)”, Aug-1998.
  12. Humayun Bakht, “Computing Unplugged, Wireless infrastructure, Some Applications of Mobile ad hoc networks”, http://www.computingunplugged.com/issues / issue200410/00001395001.html, April-2003.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Jamming attack.