A Novel Technique to Isolate and Detect Jamming Attack in MANET

Authors

  • Kaur H Dept .of CSE, I.K. Gujral Punjab technical University, India
  • Kaur R Dept .of CSE, I.K. Gujral Punjab technical University, India

Keywords:

MANET, Attacks, Grayhole, Throughput, ZRP, internal attacks

Abstract

MANET is infrastructure less, decentralized multi hope network where the nodes are randomly to move in any direction, there each node works as a router and host to send packet to each other, there is no any requirement of fixed infrastructure. There are many security threats in MANET. Various types of attacks can be easily triggered in the network. So MANET has a security issue. In this paper we have discussed about Jamming attack in AODV protocol. Due to this attack network performances degrade. Therefore a novel technique has been proposed to detect and isolate jamming attack in the network using monitoring nodes.

References

Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”, IEEE, 2009

Ashish K. Maurya, D. S. (Nov,2013). "Simulation based Performance Comparison of AODV, FSR and ZRP Routing Protocolin Manet". IJCA , 23-28.

Awadesh Kumar, P. S. (July,2013). ''Performance Anaysis Of AODV ,CBRP,DSDV and DSR MANET Routing Protocols using NS2 sIMULATION''. I.J Computer Network and Information Security , 45-50.

Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-02, Page No (145-150), Feb -2016.

Divangna Gupta, R. K. (aug,2014). Simulationof Different Routing Protocols in MANET Using NS2. International journal of Scientific and Research Publication , 1-5.

Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks” ,Springer ,2006

Smita Das, "Routing table of DSDV in Mobile Ad-hoc Networking", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (48-51), Oct -2015, E-ISSN: 2347-2693.

M Ravi Kumar, D. G. (2013). ''Performance Evaluation of AODV and FSR Routing Protocol in MANET. GJCST , 1-7.

Onkar V.Chandure, A. P. (NOV,2012). Simlation of secure AODVin Gray-hole Attack for Mobile ad-hoc Network. IJAET , 67-75.

Onkar V.Chandure, P. (2011). ''A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV Routing protocol in MANET''. IJCSIT , 2607-2611.

Preeti Gharwar, M. S. (April,2013). "Performance Comparison Of Routing Protocols''. IJARCCE , 1920-1924.

Rutvij H. Jhaveri, D. C. (2012). ''A Novel Gray Hole and Black Hole Attacks in Mobile Ad-Hoc Networks''. International Conference on Advanced Computing& Communicaion Technologies'' , 556-560.

Virali Girdhar and Gaurav Banga, "A Comparative Analysis of Different Movement Models in MANET", International Journal of Computer Sciences and Engineering, Volume-03, Issue-06, Page No (9-13), Jun -2015

S onam Gupta and Rekha Sharma,” A QoS Based Simulation Approach of Zone Routing Protocol in Wireless Ad-hoc Networks ”, International Journal of Computer Sciences and Engineering, Volume 2, issue 7, P.No 24-30, 2014

Downloads

Published

2025-11-11

How to Cite

[1]
H. Kaur and R. Kaur, “A Novel Technique to Isolate and Detect Jamming Attack in MANET”, Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 86–90, Nov. 2025.

Issue

Section

Research Article