Risk Assessment and Countermeasures for Cybersecurity, p. 235-252, 2024
DOI: 10.4018/979-8-3693-2691-6.ch013
Full text: Unavailable
Jamming is the most critical security threat because the rapid development of new technology, such as smart mobile devices, and ad hoc networks have drawn a lot of interest from the academic community in recent years. Ad hoc protocols represent an important role in the efficient transmission of data across mobile ad hoc protocols (MANET). The choice of a suitable routing protocol is influenced by several variables, including network structure, scalability, mobility, and reliability. In this chapter, the authors employed three protocols: dynamic source routing (DSR), optimized link state routing (OLSR), and temporally ordered routing algorithm (TORA) routing protocols, including distance-vector, link-state, and hybrid protocols are thoroughly analyzed under jamming attack with an emphasis on their advantages, disadvantages, and practical uses. This chapter focuses on these protocols' applicability for various network scenarios with attacks using the network simulator OPNET 14.5.