Full Paper View Go Back

Introduction Jamming attacks and its types in MANET

Sonika Thapak1 , Pradeep Chouksey2

1 Department of Computer Science, LNCT, Bhopal, India.
2 Dept. of Computer Science, Technocrats Institute of Technology, RGT University, Bhopal, India.

Correspondence should be addressed to: dr.pradeep.chouksey@gmail.com.


Section:Review Paper, Product Type: Journal
Vol.5 , Issue.4 , pp.31-32, Aug-2017

Online published on Aug 30, 2017


Copyright © Sonika Thapak, Pradeep Chouksey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sonika Thapak, Pradeep Chouksey, “Introduction Jamming attacks and its types in MANET,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.31-32, 2017.

MLA Style Citation: Sonika Thapak, Pradeep Chouksey "Introduction Jamming attacks and its types in MANET." International Journal of Scientific Research in Network Security and Communication 5.4 (2017): 31-32.

APA Style Citation: Sonika Thapak, Pradeep Chouksey, (2017). Introduction Jamming attacks and its types in MANET. International Journal of Scientific Research in Network Security and Communication, 5(4), 31-32.

BibTex Style Citation:
@article{Thapak_2017,
author = {Sonika Thapak, Pradeep Chouksey},
title = {Introduction Jamming attacks and its types in MANET},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {31-32},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=305},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=305
TI - Introduction Jamming attacks and its types in MANET
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Sonika Thapak, Pradeep Chouksey
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 31-32
IS - 4
VL - 5
SN - 2347-2693
ER -

1291 Views    558 Downloads    353 Downloads
  
  

Abstract :
In MANET every node plays a part of router and routing paths in MANETs potentially contain multiple hops. This is the reason why Mobile Ad hoc network is vulnerable to attacks.

Key-Words / Index Term :
MANET, Internet, Classification of Attacks

References :
[1] Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.
[2] Yu-seung Kim, Heejo Lee. On classifying and evaluating the effect of jamming attack.
[3] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using errordistribution.” p.p.1-6,IEEE 2009.
[4] Y.V.A. Satyanarayana, K. P. Raju, P V. Naganjaneyulu, "Resource Allocation for Multi-user Multi-Traffic Class in UWB MANET", International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.152-156, 2016.
[5] IIyas, M., 2003. The hand book of ad -hoc wireless networks. CRC press LLC.
[6] J. Kaur, G.Singh, "MANET Routing Protocols: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.60-64, 2017.
[7] M. Frodigh, P. Johansson, and P. Larsson.―Wireless ad hoc networking: the art of networking without a network,‖ Ericsson Review,No.4, 2000, pp. 248-263.
[8] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[9] Y. Hu, D. Johnson and A Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wire.
[10] D. Johnson and D. Maltz, ―Dynamic Source Routing in Ad Hoc Wireless Networks,‖ Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
[11] Belding-Royer,E.M. and C.K. Toh, 1999. A review of current routing protocols for ad-hoc mobile wireless networks.IEEE Personal Communication magazine pp:46-55.
[12] M. Frodigh, P. Johansson, and P. Larsson.―Wireless ad hoc networking: the art of networking without a network,‖ Ericsson Review,No.4, 2000, pp. 248-263.
[13] N.K. Pandey, A.K. Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.60-63, 2014.
[14] N. Kishore, S. Singh, R. Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.14-17, 2014.
[15] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015
[16] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using errordistribution.” p.p.1-6,IEEE 2009.
[17] Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood. The feasibility of launching and detectingjamming attacks in wireless networks.
[18] John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.” pp.1-6, IEEE 2007.
[19] P.W. Dkhar, R. Khongthaw, "Survey Paper on DSDV and AODV Routing Protocol of MANET", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.69-74, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation