Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/335354
Title: A cross layer token assignment and analysis model for efficient wormhole attack detection in manet
Researcher: Muthukumar, S
Guide(s): Rubasoundar, K
Keywords: Wireless Sensor Network
wormhole attack
Token assignment
University: Anna University
Completed Date: 2020
Abstract: The modern society seeks the technology which supports the human society in performing various activities. The mobile user accesses various network services through their mobile devices and PDA. Whatever the device is being used, the communication is performed through a number of networks such as Wireless Sensor Network, Mobile Ad-Hoc Network and so on. The service requests are converted in to network packets and transmitted through a number of network and base stations. Like any other network, the Mobile AdHoc Network (MANET) is also subject to face various network threats. The topological and physical characteristics of mobile nodes generate the way for the malicious nodes to enter and face different threats. Various threats are possible from eaves drop, DDoS, modification, to the wormhole attack. Among those attacks, the wormhole attack is the most dominant one which totally disengages the nodes of the network from entire transmission. The presence of wormhole attack in MANET has been identified and mitigated using several ways. In general the mitigation of wormhole attack has been performed using payload, traffic and route features. However, such a usage suffers from achieving higher performance in the detection and mitigation of wormhole attacks in MANET. To improve the performance in wormhole attack detection, an efficient Cross Layer Token Generation algorithm is proposed. The method first generates a token for each route discovery which is dedicated for specific route discovery process. The token generated has been maintained by genuine nodes. The method monitors the network conditions at each layer like the total number of packet drop which has been counted in network layer and physical layer which has been measured for signal to noise ratio. The MAC layer has been monitored for retransmission frequency. By using all these, the method performs intrusion detection to safeguard the data transmission. The method improves the performance of intrusion detection and reduces the false ratio. newline
Pagination: xiv,134 p.
URI: http://hdl.handle.net/10603/335354
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.68 kBAdobe PDFView/Open
02_certificates.pdf167.61 kBAdobe PDFView/Open
03_vivaproceedings.pdf279.87 kBAdobe PDFView/Open
04_bonafidecertificate.pdf195.7 kBAdobe PDFView/Open
05_abstracts.pdf11.3 kBAdobe PDFView/Open
06_acknowledgements.pdf246.29 kBAdobe PDFView/Open
07_contents.pdf18.02 kBAdobe PDFView/Open
08_listoftables.pdf6.75 kBAdobe PDFView/Open
09_listoffigures.pdf19.46 kBAdobe PDFView/Open
10_listofabbreviations.pdf9.86 kBAdobe PDFView/Open
11_chapter1.pdf643.63 kBAdobe PDFView/Open
12_chapter2.pdf302.13 kBAdobe PDFView/Open
13_chapter3.pdf346.27 kBAdobe PDFView/Open
14_chapter4.pdf376.58 kBAdobe PDFView/Open
15_chapter5.pdf316.3 kBAdobe PDFView/Open
16_conclusion.pdf13.32 kBAdobe PDFView/Open
17_references.pdf149.9 kBAdobe PDFView/Open
18_listofpublications.pdf108.23 kBAdobe PDFView/Open
80_recommendation.pdf44.72 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: