Investigation of Application Attack on MANET

Amit MHolkar, Neha Shinde Holkar, Dhiiraj Nitnawwre
2013 International Journal of Computer Applications  
Security in Mobile Ad-hoc Networks always draws attention of the researcher due to its unsecured boundaries, infrastructure less system and dynamic & random behavior. Most of the works in MANET have been focused on the Network Layer attacks because the attacks can be identified and its effects can be minimized on the Network layer itself. On the other hand, few attacks bypass the network layer security and reached the Application Layer. This paper investigate the effect of Application layer
more » ... ck on Mobile Ad-hoc Network using OPNET simulator and compare the outcomes of investigation of with and without attacks using different routing protocols. In our simulation, we investigate the Malicious code attack using a jammer node and compare it with a scenario of nodes having no attack. Among the two routing protocols AODV & DSR, simulation we found that under the effect of Malicious code attack AODV protocol outperforms while we concern about the delay and DSR protocol gives best result while we concern about the load.
doi:10.5120/12430-9190 fatcat:qawbuoueffcx5egwhslzrm5l2e