Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/335354
Title: | A cross layer token assignment and analysis model for efficient wormhole attack detection in manet |
Researcher: | Muthukumar, S |
Guide(s): | Rubasoundar, K |
Keywords: | Wireless Sensor Network wormhole attack Token assignment |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | The modern society seeks the technology which supports the human society in performing various activities. The mobile user accesses various network services through their mobile devices and PDA. Whatever the device is being used, the communication is performed through a number of networks such as Wireless Sensor Network, Mobile Ad-Hoc Network and so on. The service requests are converted in to network packets and transmitted through a number of network and base stations. Like any other network, the Mobile AdHoc Network (MANET) is also subject to face various network threats. The topological and physical characteristics of mobile nodes generate the way for the malicious nodes to enter and face different threats. Various threats are possible from eaves drop, DDoS, modification, to the wormhole attack. Among those attacks, the wormhole attack is the most dominant one which totally disengages the nodes of the network from entire transmission. The presence of wormhole attack in MANET has been identified and mitigated using several ways. In general the mitigation of wormhole attack has been performed using payload, traffic and route features. However, such a usage suffers from achieving higher performance in the detection and mitigation of wormhole attacks in MANET. To improve the performance in wormhole attack detection, an efficient Cross Layer Token Generation algorithm is proposed. The method first generates a token for each route discovery which is dedicated for specific route discovery process. The token generated has been maintained by genuine nodes. The method monitors the network conditions at each layer like the total number of packet drop which has been counted in network layer and physical layer which has been measured for signal to noise ratio. The MAC layer has been monitored for retransmission frequency. By using all these, the method performs intrusion detection to safeguard the data transmission. The method improves the performance of intrusion detection and reduces the false ratio. newline |
Pagination: | xiv,134 p. |
URI: | http://hdl.handle.net/10603/335354 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 167.61 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 279.87 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 195.7 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 11.3 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 246.29 kB | Adobe PDF | View/Open | |
07_contents.pdf | 18.02 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 6.75 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 19.46 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 9.86 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 643.63 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 302.13 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 346.27 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 376.58 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 316.3 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 13.32 kB | Adobe PDF | View/Open | |
17_references.pdf | 149.9 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 108.23 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 44.72 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: