Abstract

A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-to-end throughput in the network. The JellyFish attack is classified as a JF-Reorder attack, JF-Delay Variance attack and JF-Periodic Drop attack. JellyFish attack conforms to all existing routing and forwarding protocol specifications, and therefore it becomes very difficult to detect. In this paper, the main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call