Open Access Open Access  Restricted Access Subscription or Fee Access

OEC-AODV: Optimized Energy Constrained AODV Protocol for Detection and Prevention of JellyFish Delay Variance Attack

I. Kavitha, S. Amutha

Abstract


ABSTRACT

Mobile ad hoc Networks (MANETs) are more vulnerable to different types of attacks due to its insecure communication and dynamic forming technology. JellyFish is a new type of DOS attack which is focus on closed loop protocols like TCP. A main goal of this attack is to decrease the throughput and increase the end to end delay. It leads to decrease the overall performance of network. In order to combat the JellyFish attack in MANETs, this paper proposes a novel technique called Optimized Energy Constrained AODV protocol for Detection and Prevention of JellyFish Delay Variance Attack (OEC-AODV). The Optimized AODV in MANET routing protocol should provide energy efficient multi hop route between source and destination pair. AODV routing protocol selects shortest path for route establishment. But the repeated selection of certain nodes which exhaust battery power of such nodes faster than others. Thus, the routing protocol should consider the residual energy of the nodes for route establishment. In the Optimized AODV protocol source node will determine threshold value of energy i.e. the amount of energy required to complete the communication without any link breakage in network. The OEC- AODV technique aims to maximize the utilization of battery power of nodes based on residual energy. The technique is tested using NS-2 simulator against other existing techniques, i.e. ABC, MABC and APD-JFAD algorithms by various parameters such as throughput, PDR, dropped packet ratio and delay. The results prove that OEC-AODV is highly efficient in JellyFish attack detection and also performs well as compared to other algorithms.

 

Keywords: Mobile,ad hoc Network,OEC-AODC,types of network layers, JellyFish attack, energy consumption, AODV, packet forwarding, End to end delay.

Cite this Article: I. Kavitha, S. Amutha. OEC-AODV: Optimized Energy Constrained AODV Protocol for Detection and Prevention of JellyFish Delay Variance Attack. International Journal of Satellite Communication & Remote Sensing. 2019; 5 (2): 35-48p.


Full Text:

PDF

References


S. Corson and J. Macker, Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC Editor, doi>10.17487/RFC2501, 1999.

Q.-A. Zeng and D. P. Agrawal, Handbook of Wireless Networks and Mobile Computing. New York, NY, USA: Wiley, ISBN:9780471419020 2002.

S. Zheng, W. U. Weiqiang, and Q. Zhang, ‘‘Energy and link-state based routing protocol for MANET,’’ IEICE Trans. Inf. Syst., vol. 94, no. 5,pp. 1026–1034, 2011.

M. K. Marina and S. R. Das, ‘‘Ad hoc on-demand multipath distance vector routing,’’ Wireless Commun. Mobile Comput., vol. 6, no. 7, pp. 969–988,2006.

M. Tekaya, N. Tabbane, and S. Tabbane, ‘‘Multipath routing mechanism with load balancing in ad hoc network,’’ in Proc. Int. Conf. Comput. Eng.Syst. (ICCES), Cairo, Egypt, Nov. 2010, pp. 67–72.

L. Gatani, G. L. Re, and S. Gaglio, ‘‘Notice of violation of IEEE publication principles an adaptive routing protocol for ad hoc peer-to-peer networks,’’ in Proc. 6th IEEE Int. Symp. World Wireless Mobile Multimedia Netw., Italy ,Jun. 2005, pp. 44–50.

Y. Chaba, R. B. Patel, and R. Gargi, ‘‘Issues and challenges involved in multipath routing with DYMO protocol,’’ Int. J. Inf. Technol. Knowl. Manage., vol. 5, no. 1, pp. 21–25, Jan./Jun. 2012.

S. Mueller, R. P. Tsang, and D. Ghosal, ‘‘Multipath routing in mobile ad hoc networks: Issues and challenges,’’ in Performance Tools and Applications to Networked Systems. Berlin, Germany: Springer, 2004,pp. 209–234, book series (LNCS, volume 2965).

V. Balaji and V. Duraisamy, ‘‘Varying overhead ad hoc on demand vector routing in highly mobile ad hoc network,’’ J. Comput. Sci., vol. 7, no. 5,pp. 678– 682, 2011.

M. Poonam and D. Preeti, ‘‘Packet forwarding using AOMDV algorithm in WSN,’’ Int. J. Appl. Innov. Eng. Manage. (IJAIEM), vol. 3, no. 5,pp. 456– 459, May 2014.

G. Cervera, M. Barbeau, J. Garcia-Alfaro, and E. Kranakis, ‘‘A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs,’’ J. Netw. Comput. Appl., vol. 36, no. 2,pp. 744–755, Mar. 2013.

M. K. Marina and S. R. Das, ‘‘On-demand multipath distance vector routing in ad hoc networks,’’ in Proc. 9th Int. Conf. Netw. Protocols, USA ,Nov.2001, pp. 14–23.




DOI: https://doi.org/10.37591/jscrs.v5i2.1191

Refbacks

  • There are currently no refbacks.