Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/206422
Title: Reliable routing protocol for mobile adhoc network
Researcher: Kajal Shambhubhai Patel
Guide(s): J S Shah
Keywords: MANET, Routing, Trust, attacks, selfish node, trust table, secure routing
University: Gujarat Technological University
Completed Date: 02-01-2018
Abstract: quotMANET help us in setting up a network of mobile nodes like laptop, smart phones, tablet etc. without the need of any infrastructure setup. The topology of the network may change frequently due to node movement. Nodes are resource constrained and uses wireless media for communication. Each node has to act as a router to forward data of other nodes. Due to these characteristics, the routing is vulnerable to many security attacks like data loss, delay etc. Apart from these attacks, the MANET is vulnerable to low quality of service, wrong advertisement and malicious activities due to its open nature which are difficult to control and detect. To detect attacker nodes researchers have come up with cryptography based solutions. In a MANET, behaviour of a node changes due to malicious behaviour of the nodes/hardware failure/mobility of the node. The cryptographic approaches cannot detect such continuously changing behaviour of nodes. Researchers come up with a trust based routing solutions which use communication parameters for calculating trust value of a node and aggregate them to calculate trust value. They create a route based on trust of nodes and give one trustworthy route with most trusted nodes. This may add extra burden to trustworthy nodes and free other nodes from routing. To address this we can think of searching multiple trusted route between same source to destination during route formation. This allows us to use other available routes, if any route fails and the load of routing is divided among multiple nodes. In our routing scheme TMA-AODV (Trust based Mobility Aware AODV), we have used a number of packets dropped, the number of packets delayed and number of time node move out of the active route due to its movement for trust computation. The first two parameters detect the packet drop and packet delay attack and the latter parameter provides a stable route. For the implementation, we used the OPNET simulator. We have implemented drop attack and delay attacks to study its effect on route discovery time
Pagination: xxv, 159p.
URI: http://hdl.handle.net/10603/206422
Appears in Departments:Computer/IT Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File103.41 kBAdobe PDFView/Open
02_certificates.pdf143.73 kBAdobe PDFView/Open
03_abstract.pdf66.76 kBAdobe PDFView/Open
04_declaration.pdf78.02 kBAdobe PDFView/Open
05_acknowledgement.pdf62.63 kBAdobe PDFView/Open
06_contents.pdf114.64 kBAdobe PDFView/Open
07_list_of_tables.pdf68.69 kBAdobe PDFView/Open
08_list_of_figures.pdf86.97 kBAdobe PDFView/Open
09_abbreviation.pdf78.49 kBAdobe PDFView/Open
10_chapter1.pdf283.55 kBAdobe PDFView/Open
11_chapter2.pdf243.13 kBAdobe PDFView/Open
12_chapter3.pdf370.6 kBAdobe PDFView/Open
13_chapter4.pdf423.75 kBAdobe PDFView/Open
14_chapter5.pdf542.78 kBAdobe PDFView/Open
15_chapter6.pdf940.41 kBAdobe PDFView/Open
16_chapter7.pdf800.58 kBAdobe PDFView/Open
17_chapter8.pdf232.04 kBAdobe PDFView/Open
18_references.pdf99.81 kBAdobe PDFView/Open
19_appendix_a.pdf71.84 kBAdobe PDFView/Open
thesis_kajal_patel_129990907006.pdf2.22 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: