Performance Evaluation of A Reverse Aodv And Aodv Routing Protocol Under Jellyfish Attacks in Mobile Ad Hoc Network
- Authors
-
-
M. A. Azeez
Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
-
O. Oluwaseyi
Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
-
A. A. Ajiboye
Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
-
A. Iwayemi
Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
-
- Keywords:
- RAODV, AODV, Jellyfish Attack, manet, protocol
- Abstract
-
Mobile Ad hoc network (MANET) is an example of mobile wireless network characterized by dynamic topology, self-organization, auto-configuration, lack of infrastructure and decentralize administrator that made it more useful in military battlefield, smart building and emergency rescue. The nodes vulnerability in MANET security becomes the center of creative research efforts. Many security schemes were proposed, rather than trying to encompass the entire field of MANET security. In this paper the same security issue was addressed by evaluating the performance of two reactive protocols Ad-hoc On-demand Distance Vector (AODV) protocol and Reverse Ad-hoc On-demand Distance Vector under jellyfish attacks. This research adopts the use of Network simulator 2.35 to test the two reactive protocols vulnerability in the presence of jellyfish attacks. The results of the performance metrics shown that the two protocols average throughputs were affected in the presence of the attacks and increase tremendously as the number of node increases, while packet delivery ratio decrease with increase in number of malicious nodes. The jellyfish attacks have great effect in number of packet drop in the protocols. Less packet drop in the presence of single jellyfish but greatly increase as more threats were introduced and maintain the increase rate as the number of attacks increase. The experimental results for all scenarios shown that the higher the jellyfish attacks on AODV and RAODV the lower the performance of the two protocols.
- References
- Downloads
- Published
- 2019-05-03
- Section
- Articles
- License
-
Copyright
With the submission of a manuscript, the corresponding author confirms that the manuscript is not under consideration by another journal. With the acceptance of a manuscript, the Journal reserves the exclusive right of publication and dissemination of the information contained in the article. The veracity of the paper and all the claims therein is solely the opinion of the authors not the journal.
How to Cite
Similar Articles
- Oluwadare Michael Ayegun, Akingbade Kayode Francis, Popoola Julius Jide , Ubochi Brendan Chijioke , INVESTIGATING A TRANSPARENT AND INTERPRETABLE DEEP LEARNING MODEL FOR ENHANCED JAMMING ATTACK DETECTION IN UAV COMMUNICATION NETWORKS , FUTA JOURNAL OF ENGINEERING AND ENGINEERING TECHNOLOGY: Vol. 19 No. 1 (2025): FUTA Journal of Engineering and Engineering Technology
- Folasade Dahunsi, Oluwasina Aderinwale, Abayomi Adesida, Abiola Alayande, J. Ojo, Oluwaseyi Falola, Oluwarotimi Dahunsi, DEVELOPMENT OF A SPACE TECHNOLOGY CAPACITY BUILDING INITIATIVE AT THE FEDERAL UNIVERSITY OF TECHNOLOGY, AKURE, NIGERIA , FUTA JOURNAL OF ENGINEERING AND ENGINEERING TECHNOLOGY: Vol. 15 No. 1 (2021): FUTA Journal of Engineering and Engineering Technology
You may also start an advanced similarity search for this article.