International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 109 - Number 9 |
Year of Publication: 2015 |
Authors: Priya Maheshwari, Leenu Singh |
10.5120/19214-0935 |
Priya Maheshwari, Leenu Singh . Analysis of Jellyfish Reorder Attack on ZRP. International Journal of Computer Applications. 109, 9 ( January 2015), 5-7. DOI=10.5120/19214-0935
MANETs are more susceptible to attacks than a wired network. High mobility, lack of central administration, etc. are some of the main causes. One of the DOS attacks known as Jellyfish Attack is difficult to analyze as well as to detect in MANETs as Jellyfisher nodes follow all the protocol rules. There are mainly three classes of jellyfish attacks named as a Jellyfish Reorder Attack, Jellyfish Periodic Dropping Attack and Jellyfish Delay Variance Attack. Jellyfish Reorder Attack is the most devastating attack amongst the three. The attacker node reorders the packet, and reduces the Goodput of destination to a certain level and increases the average End-to-End Delay. ZRP is the hybrid protocol in which each node forms its own zone. This paper is focused on analyzing the impact of the jellyfish reorder attack on the ZRP protocol by using NS2 as a simulator. The metrics used during the simulation are Goodput and End-to-End Delay.