Design and Implementation of NAODV_ETCP to Handle Jelly Fish Attack

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-35 Number-7
Year of Publication : 2016
Authors : Preety Dahiya, Miss Bhawana
DOI :  10.14445/22315381/IJETT-V35P262

Citation 

Preety Dahiya, Miss Bhawana"Design and Implementation of NAODV_ETCP to Handle Jelly Fish Attack", International Journal of Engineering Trends and Technology (IJETT), V35(7),300-304 May 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
This paper modifies the existing TCP and AODV system to handle the jelly fish periodic dropping attack, the jellyfish packet reordering attack and the jelly fish delay variance attack. The proposed system modifies the AODV routing protocol and TCP to handle the jelly fish attack variants. The proposed system uses the E_TCP of the existing system along with the modified AODV routing to get the effective results. In the E_TCP protocol the buffer stores the sequence number and the acknowledgement time while in the NAODV_ETCP protocol the fr(forwarding ratio) is also stored in buffer. This paper analyzes the performance using PDR, E2Edelay and the throughput on the various scenario attacked by different types of jellyfish attack. The result analysis shows that the performance of NAODV_ETCP is better than the ETCP protocol.

 References

[1]Nguyen, Hoang Lan, and Uyen Trang Nguyen. (2008),A Study Of Different Types Of Attacks On Multicast In Mobile Ad Hoc Networks., Ad Hoc Networks 6, no. 1.
[2]Begum, Syed Atiya, L. Mohan, and B. Ranjitha.(2012), Techniques for Resilience of Denial of service Attacks in Mobile Ad Hoc Networks. Proceedings published by International Journal of Electronics Communication and Computer Engineering 3, no. 1.
[3] Dyer, Thomas D., and Rajendra V. Boppana.(2001), A comparison of TCP performance over three routing protocols for mobile ad hoc networks., In proceedings of the 2nd ACM international symposium on mobile ad hoc networking and computing, pp. 56-66. ACM.
[4] Tamilselvan, Latha, and V. Sankaranarayanan.(2007) Prevention of black hole attack in MANET. In Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on, pp.21-21. I EEE,
[5] Jhaveri, Rutvij H., Ashish D. Patel, Jatin D. Parmer, and Bhavin I. Shah.(2010) MANET routing protocols and wormhole attack against AODV. International Journal Of Computer Science And Network Security10, no. 4: 12-18.
[6] Wazid, Mohammad, Avita Katal, Roshan Singh Sachan, and R.H. Goudar.(2013) E-TCP for efficient performance of MANET under JF delay variance attack. In Information and Communication Technologies (ICT), 2013 IEEE Conference on, pp. 145-150 IEEE,
[7] Bhattacharyya, Aniruddha, Arnab Banerjee, Dipayan Bose, Himadri Nath Different types of attacks in Mobile ADHOC Network., arXiv preprint arXiv: 1111.4090.
[8]Amandeep Kaur et al (2013) Effects of Jelly Fish Attack on Mobile Ad-Hoc Network’s Routing Protocols, Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1694-1700
[9]Mr. Hepikumar R. Khirasariya,(NOV 12 TO OCT 13.), Simulation Study of Jelly Fish Attack In Manet (Mobile Ad Hoc Network) Using Aodv Routing Protocol, Journal Of Information, Knowledge And Research In Computer Engineering, ISSN: 0975-6760 VOLUME- 02,ISSUE-02

Keywords
MANET, Jelly Fish Attack, AODV.