Reputation Based Trust Mechnism to Isolate JellyFish Attackers in Mobile Ad Hoc Network

Authors

  • Annu Kumari M.Tech Sudent ,Department of Computer Science and Engineering, MPCT, Gwalior, India
  • K.K. Joshi H.O.D, Department of Computer Science and Engineering, MPCT, Gwalior, India

Keywords:

MANET, JF Attack, Malicious nodes, Reordering packets, Dropping packets, Trust, Security and Protocols

Abstract

with the advancement in technology, Mobile Ad Hoc Network provide communication a number of the
nodes for the movement of data from source to destination. In a MANET every tool is loose to transport independently in
any route, and could consequently trade its links to other gadgets frequently. Each must forward traffic unrelated to its
personal use, and it acts as a router. MANETs contains one or extra and specific transceivers among nodes. It is wireless
medium which make it susceptible to various attacks. Jellyfish attack is mainly considered as common in the network in
which packets are not reached towards the destination properly. In our proposed work, we used reputation based scheme
for the removal of malicious nodes from the network and reduce the effect of Jellyfish attackers. We used NS2 for the
simulation of our proposed work and show the difference between existing and proposed work in the network.

Published

2018-01-25

How to Cite

Annu Kumari, & K.K. Joshi. (2018). Reputation Based Trust Mechnism to Isolate JellyFish Attackers in Mobile Ad Hoc Network. International Journal of Advance Engineering and Research Development (IJAERD), 5(1), 359–364. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/2072