JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. (June 2015)
- Record Type:
- Journal Article
- Title:
- JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. (June 2015)
- Main Title:
- JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
- Authors:
- Laxmi, Vijay
Lal, Chhagan
Gaur, M.S.
Mehta, Deepanshu - Abstract:
- Abstract: Mobile ad hoc networks (MANETs) are vulnerable to various types of attacks due to inherently in-secure wireless communication medium and multihop routing communication process. In this paper, we analyze the behavior and impact of JellyFish attack over TCP-based MANETs. We have implemented and evaluated all three variants of JellyFish attack namely JF-reorder, JF-delay and JF-drop through simulation processes. These attacks exploit the behavior of closed loop protocols such as TCP and disturb the communication process without disobeying any protocol rules, thus the detection process becomes difficult. Consequently, traffic is disrupted leading to degradation in network throughput. Through extensive simulation results that are obtained using an industry standard scalable network simulator called EXata-Cyber, impact of these attacks in terms of network throughput, overhead incurred and end-to-end delay is analyzed and used for devising detection and countermeasure. We have proposed a light-weight direct trust-based detection (DTD) algorithm which detect and remove a JellyFish node from an active communication route. In our proposed DTD algorithm, each node uses locally calculated trust values which are collected over a time period to identify whether its neighbor node is a JF-attacker or not.
- Is Part Of:
- Journal of information security and applications. Volume 22(2015)
- Journal:
- Journal of information security and applications
- Issue:
- Volume 22(2015)
- Issue Display:
- Volume 22, Issue 2015 (2015)
- Year:
- 2015
- Volume:
- 22
- Issue:
- 2015
- Issue Sort Value:
- 2015-0022-2015-0000
- Page Start:
- 99
- Page End:
- 112
- Publication Date:
- 2015-06
- Subjects:
- JellyFish attack -- TCP -- Routing protocol -- Malicious node -- Wireless networks -- Network security
Computer security -- Periodicals
Information technology -- Security measures -- Periodicals
005.805 - Journal URLs:
- http://www.sciencedirect.com/ ↗
- DOI:
- 10.1016/j.jisa.2014.09.003 ↗
- Languages:
- English
- ISSNs:
- 2214-2126
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 2748.xml