Impact of Jelly Fish Attackonthe Performance of DSR Routing Protocol in MANETs


Muhammad Sajjad,Khalid Saeed,Tariq Hussain,ArbabWaseem Abbas,Irshad Khalil,Iqtidar Ali,Nida Gul,



Mobile Ad-Hoc Networks,Dynamic Source Routing,Jellyfish Attack,Security Issues,


Mobile Ad-hoc Networks (MANETs) could be setup frequently without the need of pre-established infrastructure. The nodes in MANETs are free to move and they can join as well as leave the network. Due to the dynamic nature of nodes in MANETs, routing protocols in MANET are extremely vulnerable to different security attacks. Like other different security attacks, Jellyfish attack is one of the most dangerous attacks in MANETs environment and it degrades the overall performance. In such type of attack, the packets reached its destination but take more time and hence it is difficult to detect such attack. In this research paper, we have analyzed the performance of Dynamic Source Routing (DSR) routing protocol in the presence of Jellyfish attack. To evaluate the performance we have created different scenarios having various number of Jellyfish attacks in MANETs environment. From the simulation result, it has been observed that Jellyfish attack significantly degrades the performance of DSR protocol in terms of end to end delay, throughput and packet delivery ratio. Moreover it has also been observed that when the number of Jellyfish attacks increases in the network then the performance is further degraded. In this research OPNET Modeler 14.5 simulator has been used in order to assess the performance of Jellyfish attack in MANETs environment.


I A. Kaur and D. T. P. Singh, “Securing MANET from jellyfish attack using
selective node participation approach,” International Journal of Engineering
and Technical Research (IJETR) ISSN, pp. 2321–0869.
II Al Dulaimi, L. A. K., R. B. Ahmad., N, Yaakob., S, N, W, Shamsuddin and
M, Elshaikh 2018. Behavioral and performance jellyfish attack. Indonesian
Journal of Electrical Engineering and Computer Science Vol. 13, No. 2,
February 2019, pp. 683~688,
III Cai, J. P. Yi. J.Chen. Z. Wang and N. Liu. 2010. An Adaptive Approach to
Detecting Black and Gray Hole Attacks in Ad Hoc Network . 24th IEEE
International Conference on Advanced Information Networking and
Applications; pp 775-780
IV Doss, S., Nayyar, A., Suseendran, G., Tanwar, S., Khanna, A., & Thong, P.
H. (2018). APD-JFAD: Accurate prevention and detection of Jelly Fish
attack in MANET. Ieee Access, 6, 56954-56965.
V Khirasariya H. 2001. Simulation study of jellyfish attack in MANET (mobile
ad hoc network) using Aodv Routing Protocol.Journal Of Information,
Knowledge And Research In Computer Engineering; Vol(2); pp 344-347
VI M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing
protocols for mobile ad hoc networks,” Ad hoc networks, vol. 2, no. 1, pp. 1–
22, 2004.
VII M.Kaur, M.Rani.and A. Nayyar. 2014. A Comprehensive Study of Jelly Fish
Attack in Mobile Ad hoc Networks. International Journal of Computer
Science and Mobile Computing; Vol(3): pp 199-203
VIII Mewara, H.S. and S. Porwal. 2010. Node Density and Traffic based
Modelling and Analysis of Routing Protocols for MANETs; pp 1-6
IX P. Misra, “Routing protocols for ad hoc mobile wireless networks,” Courses
Notes, available at http://www. cis. ohiostate. edu/˜ jain/cis788-99/adhoc
routing/index. html, 1999.
X R.V Boppana, and A. Mathur. 2005. Analysis of the Dynamic Source
Routing Protocol for Ad Hoc Networks. Workshop on Next Generation
Wireless Networks; pp 1-8.

View Download