info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Detection and Prevention for Jamming Attack in MANET using TAODV Protocol

Authors: Soneram verma, Prof. Maya Yadav

Certificate: View Certificate

Abstract

MANET (Mobile Ad Hoc Network) could be a collection of self configurable mobile nodes wherever every node acts as a router for different nodes, which permits knowledge to travel, utilizing multi-hop network paths. MANETs are vulnerable to various attacks in the least layers, because the design of most MANET routing protocols assumes as if there is no malicious intruder node within the network. The main aim of this work is to develop trust based on-demand routing protocols for knowledge transmission below jamming attack in MANET. The proposed protocols should be efficient in terms of Packet Delivery ratio, End-to-End Delay, normalized routing load (NRL), Residual Energy and Throughput. Based on the motivations to produce new security measures to be incorporated in popular routing protocols AODV, the aim of this work has been implement secure ondemand routing (TAODV) protocols for data transmission in MANET and detect jamming node in MANET scenario using TAODV protocol. Also Prevent the network from jamming attack and improve the packet delivery fraction, throughput and end-to-end delay, normalized routing load, Residual Energy even with the presence of jamming attacks. The results of both AODV and TAODV compare to analyze that of those 2 types of protocols provides higher performance. Keywords Mobile Ad-hoc Network (MANET), NS-2.35, jamming attack, AODV and TAODV routing protocol.

Introduction

Emergence of moveable wireless communication devices and ascension in cellular technology have created mobile ad hoc networks (MANET) widespread in civil and military applications. The interest in ad hoc networks stem from its ability to produce instant networking resolution in an area wherever the cellular infrastructure is either very costly or impossible to deploy. MANETs will be deployed while not the necessity for any mounted infrastructure like base stations. Nodes in MANET assemble among themselves to determine the network dynamically. They act as a source similarly as router. As a resource they generate the packet and as a router they forward the packet. Packets are transmitted from source to destination in multihops. MANETs has tremendous applications each in military and civil (medical, mobile computing, disaster recovery) [7]. Applications of MANET depend on the effectiveness of routing protocol. Nodes in MANET are high-powered by electro-chemical batteries whose capability is restricted. Service and/or replacement these batteries might not be possible.

Conclusion

MANET has the ability to deploy a network where a traditional network infrastructure environment cannot possibly be deployed. Security of MANET is one of the important features for its deployment. , the detection and prevention of jamming attack in the network exists as a challenging task. In this work analyzed the effect of jamming attack in the performance of AODV protocol and prevent the network from jamming attack using TAODV protocol. The simulation has been done using the network simulator (NS-2.35). The performance metrics like packet delivery ratio, Normalized Routing load (NRL), throughput and average end to end delay has been measured and analyzed with the variable node density. From the simulation results it is clear that when the jammer node exists in the network, it can be affected and decreased the performance of AODV routing protocol. In this work, we simulated AODV protocol with different density, where each one has 20 nodes, 40 nodes, 60 nodes and also simulated the same scenarios after introducing single jamming Node into the network. Moreover, we simulated Secure AODV as per algorithm for detection of Jamming attack. Finally compare the results of solution with normal AODV under attack by varying different network parameters using same scenarios in NS-2.35. Our simulation results are analyzed above. Analyzing the results of PDR, throughput, End to end delay, NRL and improve result during jamming attack.

Copyright

Copyright © 2025 Soneram verma, Prof. Maya Yadav. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS25

Publish Date: 2016-06-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service