Detection and Prevention for Jamming Attack in MANET using TAODV Protocol
Authors: Soneram verma, Prof. Maya Yadav
Certificate: View Certificate
Abstract
MANET (Mobile Ad Hoc Network) could be a collection of self configurable mobile nodes wherever every node acts as a router for different nodes, which permits knowledge to travel, utilizing multi-hop network paths. MANETs are vulnerable to various attacks in the least layers, because the design of most MANET routing protocols assumes as if there is no malicious intruder node within the network. The main aim of this work is to develop trust based on-demand routing protocols for knowledge transmission below jamming attack in MANET. The proposed protocols should be efficient in terms of Packet Delivery ratio, End-to-End Delay, normalized routing load (NRL), Residual Energy and Throughput. Based on the motivations to produce new security measures to be incorporated in popular routing protocols AODV, the aim of this work has been implement secure ondemand routing (TAODV) protocols for data transmission in MANET and detect jamming node in MANET scenario using TAODV protocol. Also Prevent the network from jamming attack and improve the packet delivery fraction, throughput and end-to-end delay, normalized routing load, Residual Energy even with the presence of jamming attacks. The results of both AODV and TAODV compare to analyze that of those 2 types of protocols provides higher performance. Keywords Mobile Ad-hoc Network (MANET), NS-2.35, jamming attack, AODV and TAODV routing protocol.
Introduction
Emergence of moveable wireless communication devices and ascension in cellular technology have created mobile ad hoc networks (MANET) widespread in civil and military applications. The interest in ad hoc networks stem from its ability to produce instant networking resolution in an area wherever the cellular infrastructure is either very costly or impossible to deploy. MANETs will be deployed while not the necessity for any mounted infrastructure like base stations. Nodes in MANET assemble among themselves to determine the network dynamically. They act as a source similarly as router. As a resource they generate the packet and as a router they forward the packet. Packets are transmitted from source to destination in multihops. MANETs has tremendous applications each in military and civil (medical, mobile computing, disaster recovery) [7]. Applications of MANET depend on the effectiveness of routing protocol. Nodes in MANET are high-powered by electro-chemical batteries whose capability is restricted. Service and/or replacement these batteries might not be possible.
Conclusion
MANET has the ability to deploy a network where a traditional network infrastructure environment cannot possibly be deployed. Security of MANET is one of the important features for its deployment. , the detection and prevention of jamming attack in the network exists as a challenging task. In this work analyzed the effect of jamming attack in the performance of AODV protocol and prevent the network from jamming attack using TAODV protocol. The simulation has been done using the network simulator (NS-2.35). The performance metrics like packet delivery ratio, Normalized Routing load (NRL), throughput and average end to end delay has been measured and analyzed with the variable node density. From the simulation results it is clear that when the jammer node exists in the network, it can be affected and decreased the performance of AODV routing protocol. In this work, we simulated AODV protocol with different density, where each one has 20 nodes, 40 nodes, 60 nodes and also simulated the same scenarios after introducing single jamming Node into the network. Moreover, we simulated Secure AODV as per algorithm for detection of Jamming attack. Finally compare the results of solution with normal AODV under attack by varying different network parameters using same scenarios in NS-2.35. Our simulation results are analyzed above. Analyzing the results of PDR, throughput, End to end delay, NRL and improve result during jamming attack.
Copyright
Copyright © 2025 Soneram verma, Prof. Maya Yadav. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.