International Journal for Development of Computer Science & Technology (IJDCST)
Adversary disrupts victim's communication channels through jamming in wireless ad hoc network governed by reactive protocols. Although the attack models are classified as both external and internal with the later being more serious because the \"Always-on\" strategy employed in external model has several disadvantages. First, the adversary has to expend a significant amount of energy to jam frequency bands of interest. Second, the continuous presence of unusually high interference levels makes this type of attacks easy to detect.