Please use this identifier to cite or link to this item:
Title: Secure Replay OLSR Mitigation of Wormhole Attacks Using Modified OLSR
Researcher: P.Suganthi
Guide(s): Dr.A.Tamilarasi
Keywords: computer, Secure Replay, OLSR
Upload Date: 7-May-2014
University: Mother Teresa Womens University
Completed Date: 09/01/2014
Abstract: Ad-hoc networks are more vulnerable to security issues compared to the wired network newlinedue to their communication channel being wireless and the co-operative nature of the nodes forming a network. Security ulnerabilities can occur in all layers of the Open System Interconnection (OSI) model. Attacks can be categorized based on the mode of operation and newlinegenerally fall under one of the following categories: Wormhole attack, Flooding attack, Spoofing attack, Detour attack, Rushing attack and Falsified route error generation attack. Optimized Link State Routing(OLSR) protocol is designed based on optimization of link newlinestate protocol and performs effectively for large and dense ad- hoc network. It eliminates some newlineof the disadvantages of Distance sequence Distance Vector (DSDV) routing protocols by means newlineof Multi Point Relays (MPR) flooding technique which reduces the topology broadcast packets. newlineIt consists of two types of control message for establishing communication between nodes: Hello newlinemessage and Topology Control (TC) message. Hello messages are always transmitted one hop, newlinetoidentify the neighbours and link status. Topology control messages are used for broadcasting newlineneighbour and for MPR selector list. Only MPR hosts are capable of forwarding TC messages newlineand also the data throughoutof the network. In OLSR, the routing table entries include the newlinedestination address, next address, and number of hops. Routing tables are updated when a new neighbour link appears or when a link disappears, and also whenever two hop neighbours are created or removed. newlineThe current MANET systems generally use encryption based techniques to secure the newlinenetwork. Detection of symptoms for a network attack and blocking potential threats are based on newlinethese methods. Various mechanisms have been proposed by modifying the existing OLSR newlinerouting protocol to add security features. Encryption based methods place high overhead on the nodes where power and processing speed are constraints.
Pagination: 100
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.75 kBAdobe PDFView/Open
02_certificate.pdf6.71 kBAdobe PDFView/Open
03_abstract.pdf12.17 kBAdobe PDFView/Open
04_declaration.pdf6.89 kBAdobe PDFView/Open
05_acknowledgement.pdf7.22 kBAdobe PDFView/Open
06_contents.pdf14.46 kBAdobe PDFView/Open
07_list of figures.pdf14.43 kBAdobe PDFView/Open
08_list of tables.pdf10.1 kBAdobe PDFView/Open
09_abbreviations.pdf9.42 kBAdobe PDFView/Open
10_chapter 1.pdf367.7 kBAdobe PDFView/Open
11_chapter 2.pdf73.03 kBAdobe PDFView/Open
12_chapter 3.pdf160.71 kBAdobe PDFView/Open
13_chapter 4.pdf212.5 kBAdobe PDFView/Open
14_chapter 5.pdf368.67 kBAdobe PDFView/Open
15_conclusion.pdf21.34 kBAdobe PDFView/Open
16_bibliography.pdf136.13 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.