International Journal for Development of Computer Science & Technology (IJDCST)
Jamming attacks though is not a new phenomenon leads to disruptions in the communications channel which is a serious concern in reactive protocols driven ad hoc networks. The jamming models are categorized as both external and internal with the later being more serious nature because the \"Always-on\" strategy employed in external model has several risk factors to the jammer's identity. External model involves the jammer spending a significant amount of energy to jam frequency bands of interest. The continuous presence of these unusually high interference levels makes this type of attacks easy to detect.