Published in

Risk Assessment and Countermeasures for Cybersecurity, p. 235-252, 2024

DOI: 10.4018/979-8-3693-2691-6.ch013

Links

Tools

Export citation

Search in Google Scholar

Simulation of Routing Protocols for Jamming Attacks in Mobile Ad-Hoc Network

This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Jamming is the most critical security threat because the rapid development of new technology, such as smart mobile devices, and ad hoc networks have drawn a lot of interest from the academic community in recent years. Ad hoc protocols represent an important role in the efficient transmission of data across mobile ad hoc protocols (MANET). The choice of a suitable routing protocol is influenced by several variables, including network structure, scalability, mobility, and reliability. In this chapter, the authors employed three protocols: dynamic source routing (DSR), optimized link state routing (OLSR), and temporally ordered routing algorithm (TORA) routing protocols, including distance-vector, link-state, and hybrid protocols are thoroughly analyzed under jamming attack with an emphasis on their advantages, disadvantages, and practical uses. This chapter focuses on these protocols' applicability for various network scenarios with attacks using the network simulator OPNET 14.5.