CFP last date
20 December 2024
Reseach Article

Investigation of Application Attack on MANET

by Amit M Holkar, Neha Shinde Holkar, Dhiiraj Nitnawwre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 14
Year of Publication: 2013
Authors: Amit M Holkar, Neha Shinde Holkar, Dhiiraj Nitnawwre
10.5120/12430-9190

Amit M Holkar, Neha Shinde Holkar, Dhiiraj Nitnawwre . Investigation of Application Attack on MANET. International Journal of Computer Applications. 71, 14 ( June 2013), 42-45. DOI=10.5120/12430-9190

@article{ 10.5120/12430-9190,
author = { Amit M Holkar, Neha Shinde Holkar, Dhiiraj Nitnawwre },
title = { Investigation of Application Attack on MANET },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 14 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number14/12430-9190/ },
doi = { 10.5120/12430-9190 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:36.262624+05:30
%A Amit M Holkar
%A Neha Shinde Holkar
%A Dhiiraj Nitnawwre
%T Investigation of Application Attack on MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 14
%P 42-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in Mobile Ad-hoc Networks always draws attention of the researcher due to its unsecured boundaries, infrastructure less system and dynamic & random behavior. Most of the works in MANET have been focused on the Network Layer attacks because the attacks can be identified and its effects can be minimized on the Network layer itself. On the other hand, few attacks bypass the network layer security and reached the Application Layer. This paper investigate the effect of Application layer attack on Mobile Ad-hoc Network using OPNET simulator and compare the outcomes of investigation of with and without attacks using different routing protocols. In our simulation, we investigate the Malicious code attack using a jammer node and compare it with a scenario of nodes having no attack. Among the two routing protocols AODV & DSR, simulation we found that under the effect of Malicious code attack AODV protocol outperforms while we concern about the delay and DSR protocol gives best result while we concern about the load.

References
  1. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
  2. Dr. Shahriar Mohammadi and Hossein Jadidoleslamy, "A COMPARISON OF LINK LAYER ATTACKS ON WIRELESS SENSOR NETWORKS", March 2011
  3. R. Ramanathan, J. Redi and BBN Technologies, "A brief overview of ad hoc networks: challenges and directions," IEEE Communication Magazine, May 2002, Volume: 40, page(s): 20-22, ISSN: 0163-6804
  4. B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering, Florida Atlantic Universitymi
  5. Renu Mishr, Sanjeev Sharma, Rajeev Agrawal, IEEE 2010, Vulnerabilities and Security of Ad-hoc Networks.
  6. N. Meghanathan, "A Simulation-based Performance Analysis of Multicast Routing in Mobile Ad hoc Networks," International Journal of Information Processing and Management (IJIPM), Vol. 1, No. 1, pp. 4-14, July 2010.
  7. Shuyao Yu, Youkun Zhang, Chuck Song, and Kai Chen. A security architecture for Mobile Ad Hoc Networks.
Index Terms

Computer Science
Information Sciences

Keywords

Application Layer attacks Throughput Delay OPNET