DSpace Repository

DETECTION AND MITIGATION OF... WORMHOLE ATTACKS IN MOBILE AD, HOC NETWORKS

Show simple item record

dc.contributor.author Machhindra, Mahale Rahul
dc.date.accessioned 2014-11-30T06:34:39Z
dc.date.available 2014-11-30T06:34:39Z
dc.date.issued 2010
dc.identifier M.Tech en_US
dc.identifier.uri http://hdl.handle.net/123456789/12231
dc.guide Sarje, A. K.
dc.description.abstract The basic characteristic of MANET's is that nodes depend on their neighbouring nodes for routing and forwarding. Because of this nature and its other characteristic like dynamic topology, no central authority etc., manet is vulnerable to many security attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, in which two or more colluding attacker's tunnel packets from one place to another. From this tunneling they falsely claim to other nodes that they have shorter routes to intercept packets. bases In this thesis, we have proposed 2 methodspn Optimized Linked State Routing Protocol. An important effect of wormhole attack is packet dropping. To address this problem we propose a method 1 that correlates the packet sent and receive ratio to find the attacker node and to avoid paths through it. But a wormhole attacker can do more than just packet dropping as described _` • I . in method 2. We detect such node based on analysis that frequency of using wormhole link is very high compared to other routes. For avoiding such attacker nodes we generate a special type of control packet for suspicious links and detect whether there is a wormhole link based on packet sent and acknowledgement receive timings. Once wormhole nodes are detected, the traffic through wormhole nodes is effectively avoided and throughput of network is maintained. The proposed technique has been simulated on the java based JiST-Swans simulator using various scenarios en_US
dc.language.iso en en_US
dc.subject ELECTRONICS AND COMPUTER ENGINEERING en_US
dc.subject MITIGATION en_US
dc.subject WORMHOLE en_US
dc.subject HOC NETWORKS en_US
dc.title DETECTION AND MITIGATION OF... WORMHOLE ATTACKS IN MOBILE AD, HOC NETWORKS en_US
dc.type M.Tech Dessertation en_US
dc.accession.number G20263 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record