Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/352044
Title: Design and Development of An Efficient Secure AODV Routing Protocol
Researcher: Singla, Bhawna
Guide(s): Verma, Anil and Raheja, L.R.
Keywords: AODV
Manets
Secure Routing Protocols
University: Thapar Institute of Engineering and Technology
Completed Date: 2018
Abstract: Mobile Adhoc network (MANETs) applications are increasing every day due to inherent characteristics like infrastructure less nature, dynamic topology and multi-hop network. The path from source node to destination node is determined with the help of set of rules known as routing protocol. In MANETs, the routing protocols are divided into two major categories like proactive and reactive. This work discusses the Adhoc On-demand Distance Vector Routing Protocol (AODV), a kind of reactive routing protocol, for its study and modification. But MANETs is also vulnerable to number of attacks due to its nature. A lot of work has been done to make it more secure. In this work, the impacts of some of the popular attacks on a short term military rescue mission like MANETs scenario is studied. In particular, three attacks being studied on AODV routing protocol are a) Jellyfish attack b) Black hole attack c) Selfish node attack. To have the better analysis, the network size is varied firstly and then the number of malicious node is varied. Detection of malicious nodes is a challenging task. Further, isolating such malicious nodes from communication is also a great challenge. The trust based on the packet forwarding behaviour of neighbor can be used for detecting misbehaviour as discussed in previous works in literature. This model has been already presented in several works. But, by the same trust based logic, some of the neighbors those who were silent and not actively participated in communications will get wrongly identified as malicious. So, simple trust based models will mark a lot of non-malicious nodes as malicious nodes. This will initiate a lot of link failures. That is, the link between sources to destination will get broken at different locations on their path because of this false identification of malicious nodes. In this work, periodic trust handshake based detection (PTH-AODV) of black hole attack is proposed.
Pagination: 154p.
URI: http://hdl.handle.net/10603/352044
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File136.87 kBAdobe PDFView/Open
02_certificate.pdf132.42 kBAdobe PDFView/Open
03_abstract.pdf12.44 kBAdobe PDFView/Open
04_acknowledgement.pdf125.94 kBAdobe PDFView/Open
05_table of contents.pdf93.44 kBAdobe PDFView/Open
06_list of important abbreviations.pdf13.36 kBAdobe PDFView/Open
07_list of tables.pdf11.07 kBAdobe PDFView/Open
08_list of figures.pdf23.29 kBAdobe PDFView/Open
09_list of publications.pdf194.69 kBAdobe PDFView/Open
10_chapter 1.pdf772.01 kBAdobe PDFView/Open
11_chapter 2.pdf713.76 kBAdobe PDFView/Open
12_chapter 3.pdf882.44 kBAdobe PDFView/Open
13_chapter 4.pdf711.48 kBAdobe PDFView/Open
14_chapter 5.pdf799.4 kBAdobe PDFView/Open
15_chapter 6.pdf131.44 kBAdobe PDFView/Open
16_references.pdf291.77 kBAdobe PDFView/Open
80_recommendation.pdf268.65 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: