Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/12231
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMachhindra, Mahale Rahul-
dc.date.accessioned2014-11-30T06:34:39Z-
dc.date.available2014-11-30T06:34:39Z-
dc.date.issued2010-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/12231-
dc.guideSarje, A. K.-
dc.description.abstractThe basic characteristic of MANET's is that nodes depend on their neighbouring nodes for routing and forwarding. Because of this nature and its other characteristic like dynamic topology, no central authority etc., manet is vulnerable to many security attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, in which two or more colluding attacker's tunnel packets from one place to another. From this tunneling they falsely claim to other nodes that they have shorter routes to intercept packets. bases In this thesis, we have proposed 2 methodspn Optimized Linked State Routing Protocol. An important effect of wormhole attack is packet dropping. To address this problem we propose a method 1 that correlates the packet sent and receive ratio to find the attacker node and to avoid paths through it. But a wormhole attacker can do more than just packet dropping as described _` • I . in method 2. We detect such node based on analysis that frequency of using wormhole link is very high compared to other routes. For avoiding such attacker nodes we generate a special type of control packet for suspicious links and detect whether there is a wormhole link based on packet sent and acknowledgement receive timings. Once wormhole nodes are detected, the traffic through wormhole nodes is effectively avoided and throughput of network is maintained. The proposed technique has been simulated on the java based JiST-Swans simulator using various scenariosen_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectMITIGATIONen_US
dc.subjectWORMHOLEen_US
dc.subjectHOC NETWORKSen_US
dc.titleDETECTION AND MITIGATION OF... WORMHOLE ATTACKS IN MOBILE AD, HOC NETWORKSen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG20263en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG20263.pdf1.87 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.