An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic

  • Faisal Ahmed Department of Computer Science and Engineering, BRAC University & Rajshahi Science and Technology University (RSTU), Bangladesh
  • Dewan Juel Rahman Department of Computer Science and Engineering, BRAC University & Rajshahi Science and Technology University (RSTU), Bangladesh
  • Sayma Rashid Department of Computer Science and Engineering, BRAC University & Rajshahi Science and Technology University (RSTU), Bangladesh

Abstract

Mobile ad-hoc network (MANET) is an infrastructure less network. This network is a collection of randomly moving mobile nodes. As MANET does not have any centralized management, this network can form anywhere with the participation of randomly moving nodes. Because of such vulnerable behavior of MANET, this network has to face many security problems. There are so many security threats of MANET, which does not have any solution. Even detection of those problems is not easy. Some of the security threats are very severe. Those threats can even destroy the whole network. Researchers are working to find out the solution of those threats. Among those threats, we have worked with two security threats, which are Black-hole attack and Jellyfish attack. Here, we have found out the threats using HTTP traffic. We use OPNET modeler 14.5 as simulator AODV routing protocol. The aim of this paper is to find out the impact of security threats on MANET using HTTP traffic. We decide the impact using number of events and average number of events utilizing throughput of the OPNET modeler.

Downloads

Download data is not yet available.

References

[1] S.Hans, J Kumar, “A Review of Jellyfish Attack in MANET”. International Journal of Engineering, Applied and Management Sciences Paradigms, Vol. 24, Issue.01, pp.191-195,May 2015.
[2] N.Shukla, S.Gupta, A.Virmani, “Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks”, International Journal of Computer Applications (0975 – 8887), National Conference on Recent Trends in Engineering and Management “NCRTEM- 2013”
[3] C. R. Davis “Security protocols for mobile ad hoc networks”. McGill University Montreal, Quebec, Paper submission, pp.1-134, August 2006
[4] Aarti, S.S.Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”. Department of computer science & Engineering, MRIU, Faridabad, India, VOL.3 Issue.5, pp.252-257, May 2013.
[5] I. Aad and J.P. Hubaux, E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks”,IEEE/ACM Transactions on Netwroking,Vol.16,pp.791- 802,Aug.2008.
[6] S. Begum, "Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks".International Journal of Scientific & Engineering Research,Vol.3, Issue.3, pp.1-6, March 2012.
[7] C.Jiwen, Y.Ping, C.Jialin, W.Zhiyang, L.Ning,“ An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”. 24th IEEE International Conference on Advance Information Networking and Application (AINA 2010), pp.775-780, April,2010.
[8] M.N.Ahmed, A.H.Abdullah, A.EL-Syed, “ A Survey of MANET Survivability Routing Techniques”. Int. J. Communications, Network and System Sciences, pp176- 185, April 2013.
Published
2019-03-15
How to Cite
AHMED, Faisal; JUEL RAHMAN, Dewan; RASHID, Sayma. An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic. International Journal of Research and Engineering, [S.l.], v. 6, n. 2, p. 575-579, mar. 2019. ISSN 2348-7860. Available at: <https://digital.ijre.org/index.php/int_j_res_eng/article/view/373>. Date accessed: 20 oct. 2019. doi: https://doi.org/10.21276/ijre.2019.6.2.1.