International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
In this paper, the authors present an investigative analysis of Repudiation attack that arrives at the application layer in mobile ad-hoc network. Most of the research work in MANET is focused on network layer attack analysis because most attacks can be identified and its effect can be neutralized on network layer itself. But some attacks bypasses the network layer and reaches to affect the application layer. In this paper, they also implemented different routing protocols for the analysis and compare them using performance parameters like throughput, delay & load. In order to suggest the most efficient routing protocol under the influence of repudiation attack, they use this comparative study.