Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/207580
Title: | A Framework to Detect and Mitigate Wormhole Attack in Mobile Wireless Ad Hoc Network |
Researcher: | Shree Raj |
Guide(s): | Khan R.A. |
Keywords: | Information Technology |
University: | Babasaheb Bhimrao Ambedkar University |
Completed Date: | 2014 |
Abstract: | Wireless Networks are formed by a number of static and dynamic nodes to establish communication. Due to ad hoc in nature, they are gaining a lot of popularity in the field of research and users of mobile are increasing day by day. With the advent of these networks, information sharing has become feasible because of easy deploy ability in remote and difficult unattended areas. Mobile Ad hoc Networks can be easily set up because of self-organization characteristics and wireless medium. Other characteristics that attract attention towards Wireless Networks are lack of centralized fixed infrastructure, adaptability to frequent change in topologies etc... Due to nodes mobility and frequent change in topologies, Wireless Networks are susceptible to a variety of attacks. Further, MANET has the open and dynamic operational environment that makes MANET vulnerable to various network attacks. Most of the time, routing protocols are the common target for a common type of attacks. These attacks can involve in damaging, modifying, discarding routing information, manipulating information, advertise fake routes, misrouting information and eavesdropping. The situation may be precarious for confidential communication. There are different types of attacks that can harm Wireless Networks at different layers of communication and degrade network performance. The examples of these types of attacks are as Eavesdropping, Jamming, Traffic analysis and monitoring, Denial of Service, Gray hole attack, Black hole attack, Wormhole attack etc. Ad-hoc network is a collection of several wireless nodes that are capable of communicating directly with each other without having any infrastructure or any centralized administration. Multihop communication can be created by making nodes as routers. That means all nodes which involve in ad hoc network can be act as router. The wireless node can give wide range of application because of node mobility and frequent topology changes, especially in military operations and emergency and disaster relief efforts. |
Pagination: | 157p. |
URI: | http://hdl.handle.net/10603/207580 |
Appears in Departments: | Department of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 46.44 kB | Adobe PDF | View/Open |
02_certificate.pdf | 29.16 kB | Adobe PDF | View/Open | |
03_decleration.pdf | 28.92 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 31.75 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 42.51 kB | Adobe PDF | View/Open | |
06_contents.pdf | 50.22 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 29.13 kB | Adobe PDF | View/Open | |
08_list of figures.pdf | 33.92 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf | 40.87 kB | Adobe PDF | View/Open | |
10_chapter1.pdf | 174.7 kB | Adobe PDF | View/Open | |
11_chapter2.pdf | 121.66 kB | Adobe PDF | View/Open | |
12_chapter3.pdf | 172.29 kB | Adobe PDF | View/Open | |
13_chapter4.pdf | 1.04 MB | Adobe PDF | View/Open | |
14_chapter5.pdf | 64.63 kB | Adobe PDF | View/Open | |
15_summary.pdf | 207.89 kB | Adobe PDF | View/Open | |
references.pdf | 100.08 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: