Abstract
Over the past decade, the wireless world has experi enced significant developments. The emergence and pof radio frequency networking products, wireless devices lik e handheld, wearable and portable computers, Person al Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is mu ch more assailable to attacks than a wired network due to its limited physical se curity, high mobility and lack of centralized admin istration. In this paper, we present and analyze the effects of re-shuffling att ack on TCP based mobile ad-hoc networks named as Pa cket Re-Shuffling. In the packet reshuffling attack the malicious node will rthe packets in its FIFO buffer before forwar ding them towards their destination. Due to the out of order delivery the rtime out of the packet is triggered a nd the source TCP and UDP has to retransmit the packet. In this way it also stops th e TCP to perform the congestion avoidance technique . A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes alw ays relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications . However, once a route is established, attacking n odes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as E xata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end -to-end delay and packet delivery ratio. In this p aper, we are giving The study on UDP and TCP.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Research in Engineering and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.