International Journal for Development of Computer Science & Technology (IJDCST)
Adversary disrupts victim's communication channels through jamming in wireless ad hoc network governed by reactive protocols. Attack models are classified as both internal and external with more strategy employed in external and internal has several disadvantages. Firstly, adversary have to be expand a significant amount energy to frequency bands of interest, and then secondly continuous presence of unusual high interference levels makes the attacks presented for detecting attacks. An internal attack model is an adversary that is assumed to be aware of network secret implementation details of network protocols in any layer present in the network stack.