Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/206422
Title: | Reliable routing protocol for mobile adhoc network |
Researcher: | Kajal Shambhubhai Patel |
Guide(s): | J S Shah |
Keywords: | MANET, Routing, Trust, attacks, selfish node, trust table, secure routing |
University: | Gujarat Technological University |
Completed Date: | 02-01-2018 |
Abstract: | quotMANET help us in setting up a network of mobile nodes like laptop, smart phones, tablet etc. without the need of any infrastructure setup. The topology of the network may change frequently due to node movement. Nodes are resource constrained and uses wireless media for communication. Each node has to act as a router to forward data of other nodes. Due to these characteristics, the routing is vulnerable to many security attacks like data loss, delay etc. Apart from these attacks, the MANET is vulnerable to low quality of service, wrong advertisement and malicious activities due to its open nature which are difficult to control and detect. To detect attacker nodes researchers have come up with cryptography based solutions. In a MANET, behaviour of a node changes due to malicious behaviour of the nodes/hardware failure/mobility of the node. The cryptographic approaches cannot detect such continuously changing behaviour of nodes. Researchers come up with a trust based routing solutions which use communication parameters for calculating trust value of a node and aggregate them to calculate trust value. They create a route based on trust of nodes and give one trustworthy route with most trusted nodes. This may add extra burden to trustworthy nodes and free other nodes from routing. To address this we can think of searching multiple trusted route between same source to destination during route formation. This allows us to use other available routes, if any route fails and the load of routing is divided among multiple nodes. In our routing scheme TMA-AODV (Trust based Mobility Aware AODV), we have used a number of packets dropped, the number of packets delayed and number of time node move out of the active route due to its movement for trust computation. The first two parameters detect the packet drop and packet delay attack and the latter parameter provides a stable route. For the implementation, we used the OPNET simulator. We have implemented drop attack and delay attacks to study its effect on route discovery time |
Pagination: | xxv, 159p. |
URI: | http://hdl.handle.net/10603/206422 |
Appears in Departments: | Computer/IT Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 103.41 kB | Adobe PDF | View/Open |
02_certificates.pdf | 143.73 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 66.76 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 78.02 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 62.63 kB | Adobe PDF | View/Open | |
06_contents.pdf | 114.64 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf | 68.69 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf | 86.97 kB | Adobe PDF | View/Open | |
09_abbreviation.pdf | 78.49 kB | Adobe PDF | View/Open | |
10_chapter1.pdf | 283.55 kB | Adobe PDF | View/Open | |
11_chapter2.pdf | 243.13 kB | Adobe PDF | View/Open | |
12_chapter3.pdf | 370.6 kB | Adobe PDF | View/Open | |
13_chapter4.pdf | 423.75 kB | Adobe PDF | View/Open | |
14_chapter5.pdf | 542.78 kB | Adobe PDF | View/Open | |
15_chapter6.pdf | 940.41 kB | Adobe PDF | View/Open | |
16_chapter7.pdf | 800.58 kB | Adobe PDF | View/Open | |
17_chapter8.pdf | 232.04 kB | Adobe PDF | View/Open | |
18_references.pdf | 99.81 kB | Adobe PDF | View/Open | |
19_appendix_a.pdf | 71.84 kB | Adobe PDF | View/Open | |
thesis_kajal_patel_129990907006.pdf | 2.22 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: