Amandeep Kaur et al Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1694-1700 www.ijera.com 1694 | Page Effects of Jelly Fish Attack on Mobile Ad-Hoc Network’s Routing Protocols Amandeep Kaur 1 , Deepinder Singh Wadhwa 2 1 (Lecturer, Electronics and Communication Department, RIMT, Mandi Gobindgarh) 2 (Assistant Professor, Electronics and Communication Department, BGIET, Sangrur) ABSTRACT This Paper focuses on the effects of jelly fish attack on MANET’s routing protocols. Here four protocols AODV, DSR, TORA and GRP are used. Performance of the network has been evaluated in terms of Data dropped (buffer overflow), Data dropped (retry threshold exceeded), Load, Media access delay, Retransmission attempts. Simulations were carried out by using OPNET 14.5 simulator. Keywords – AODV, DSR, GRP, Jelly Fish Attack, TORA I. INTRODUCTION MANET is mobile ad-hoc network, which is a group of number of mobile nodes that forms ad-hoc network. Network nodes communicate with each other without the assistance of any centralized authority or management. It is a dynamic topology which forms a temporary network because nodes always move anywhere in the network. It is fast growing technology, whenever the existing technology fails in any area then mobile ad-hoc networks helps to continue the communication among the nodes in that area. Ramanathan and Jason Redi tell about PRNET (packet radio network) which were used. The goal of PRNET was to provide packet switching to mobile battlefields, hostile networks [1]. In 1999, Per Johansson, Tony Larsson and Nicklas Hedman compared three protocols i.e. DSDV, AODV, DSR under two types of simulations–Mobility varied and offered load was kept constant. b) Both offered load and mobility kept constant [2]. In 2003 Sanjay ramaswami , present a technique to identify multiple black hole nodes and a solution is given to find out a safe path or route to avoid cooperative black hole attack. This secured path helps the data packets to travel or transmit from source to destination [3]. The attacker nodes disrupt the route discovery process, hence in 2002, Panagiotis and Zygmunt discovered a route discovery protocol that helps to mitigate or prevent the effects of the malicious node in the network. This proposed protocol provides correct connectivity of links among the nodes. Any two nodes can simply setup a shared key for their communication [4]. Imran Raza and Amjad Ali analyses the congestion behavior of TCP and its variants for AODV and DSR protocols under persistent packet reordering jelly fish attack and proposed a solution for it by adding two new states in this scheme to mitigates the effects of reordering attack in TCPreno [5]. In 2010 multicast routing protocols were studied with capability and security techniques [6]. In 2011, simulation study of black hole attack and jelly fish attack and its impact on open loop and close loop flows and the critical performance of network were measured under these attacks [7]. In 2009, a secured routing protocol was proposed which removes the effect of black hole attack on ad-hoc on demand distance vector routing protocol. This protocol was experimentally show better results than AODV protocol. In this scheme three protocols are taken i.e. AODV, BAODV and SAODV and two scenarios CBR and FTP are taken. The performance of these three protocols were analyzed, compared and the simulation results shows that the secured routing protocol gives better performance then AODV and BAODV [8]. In 2012 a scheme was proposed which prevents the black hole attack, this method uses promiscuous mode to detect black hole node and informs about the attacker node to all the other nodes in the network [9]. After this a method was proposed to prevent both the black and gray behavior i.e. black and gray hole attacks. In this scheme to tackle these attacks extended data routing tables were to be maintained at each node. This method was also helpful in finding the cooperative black hole attacker nodes [10]. It was demonstrated in 2012 that by assigning reputation tables and values to the participating nodes the black hole nodes can be detected. These reputation tables and values assigned to every nodes acts and measured as truth worthiness of that node [11]. In 2012, performance of protocols were compared under jelly fish delay variance attack by using AODV, DSR and TORA routing protocols and average end-to-end delay, network load and Throughput are taken as performance parameters a. Here, TORA was showing better results [12]. Mohammad Wazid, Avita katal and R H Goudar proposed a cluster and super cluster based intrution detection and prevention techniques to prevent jelly fish reorder attack under FTTP (heavy load) traffic using AODV protocol [13]. RESEARCH ARTICLE OPEN ACCESS