ARTICLE
TITLE

An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic

SUMMARY

Mobile ad-hoc network (MANET) is an infrastructure less network. This network is a collection of randomly moving mobile nodes. As MANET does not have any centralized management, this network can form anywhere with the participation of randomly moving nodes. Because of such vulnerable behavior of MANET, this network has to face many security problems. There are so many security threats of MANET, which does not have any solution. Even detection of those problems is not easy. Some of the security threats are very severe. Those threats can even destroy the whole network. Researchers are working to find out the solution of those threats. Among those threats, we have worked with two security threats, which are Black-hole attack and Jellyfish attack. Here, we have found out the threats using HTTP traffic. We use OPNET modeler 14.5 as simulator AODV routing protocol. The aim of this paper is to find out the impact of security threats on MANET using HTTP traffic. We decide the impact using number of events and average number of events utilizing throughput of the OPNET modeler.

 Articles related

Sufyan Musah    

The purpose of this research is to evaluate the balance of freedom and security in Ghana’s democracy during the Covid-19 pandemic via the precautionary measures announced by the government. Ghana is considered as one of the most stable democracies in Afr... see more

Revista: Epiphany

Yanto Setiawan, Agustiawan Sembiring, Muhammad Arif, Wihdayati Wihdayati    

The 4.0 Industrial revolution has entered the mining industry. One of them is the application of big data technology in PT ABC, a coal mining contractor in Indonesia. To support the project's performance, an extensive internet connection covering certain... see more


Ika Dewi Sartika Saimima, Endang Hadrian, Anggreany Haryani Putri    

This article aims to explore theoretical problems related to femicide reporting that occurs in online media. There are two ways of thinking about femicides from a human security perspective; this is a form of continuous violence against women in the publ... see more


Dwipo Setyantoro, Vivi Afifah; Rika Astuti Hasibuan; Novi Aprilia, Novi Permata Sari    

The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can tak... see more


Sanjar Sobirovich Sharipov    

The article describes the establishment of stability, peace and tranquility in the country, ensuring the unconditional observance of human rights and freedoms, maintaining public order; the content and essence of the ongoing reforms related to the mainte... see more