Abstract

Wireless networks are gaining high popularity today and majority of the work is focused towards making ad hoc networks secure and denial of service (DoS) resilient. Ad hoc network is much more assailable to attacks than a wired network due to its limited physical security and high mobility within the network. Delay variance attack is a new DoS attack. In Jelly Fish (JF) delay variance attack, JF node gets hold of the forwarding packet from source to destination, thus performing delay or drop data packets for certain amount of time before forwarding. Due to JF attack, high end to end delay takes place in the network and throughput of the network becomes worst against normal flow of the network. In this paper, an implementation of delay variance attack is implemented using routing protocols over video based traffic used in MANETs has been performed. This paper presents the complete simulation study of Jelly Fish delay variance attacks using different parameters in different simulation scenarios. The simulations have been taken in the light of delay, throughput, number of JF nodes and network load. In addition to this, our simulation results also shed some light on the seriousness of the attacks caused by JF nodes and their effects on data communication.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call