Research Article

A Study on Improving Secure Routing Performance Using Trust Model in MANET

Figure 9

Results of transmission delay time due to Hello flooding attack, Jellyfish attack, and Jamming attack. (a) Measurement results of 50 nodes without attacks. (b) Measurement results of 50 nodes in Hello flooding attack. (c) Measurement results of 50 nodes in Jellyfish attack. (d) Measurement results of 50 nodes in Jamming attack.
(a)
(b)
(c)
(d)