Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/352044
Title: | Design and Development of An Efficient Secure AODV Routing Protocol |
Researcher: | Singla, Bhawna |
Guide(s): | Verma, Anil and Raheja, L.R. |
Keywords: | AODV Manets Secure Routing Protocols |
University: | Thapar Institute of Engineering and Technology |
Completed Date: | 2018 |
Abstract: | Mobile Adhoc network (MANETs) applications are increasing every day due to inherent characteristics like infrastructure less nature, dynamic topology and multi-hop network. The path from source node to destination node is determined with the help of set of rules known as routing protocol. In MANETs, the routing protocols are divided into two major categories like proactive and reactive. This work discusses the Adhoc On-demand Distance Vector Routing Protocol (AODV), a kind of reactive routing protocol, for its study and modification. But MANETs is also vulnerable to number of attacks due to its nature. A lot of work has been done to make it more secure. In this work, the impacts of some of the popular attacks on a short term military rescue mission like MANETs scenario is studied. In particular, three attacks being studied on AODV routing protocol are a) Jellyfish attack b) Black hole attack c) Selfish node attack. To have the better analysis, the network size is varied firstly and then the number of malicious node is varied. Detection of malicious nodes is a challenging task. Further, isolating such malicious nodes from communication is also a great challenge. The trust based on the packet forwarding behaviour of neighbor can be used for detecting misbehaviour as discussed in previous works in literature. This model has been already presented in several works. But, by the same trust based logic, some of the neighbors those who were silent and not actively participated in communications will get wrongly identified as malicious. So, simple trust based models will mark a lot of non-malicious nodes as malicious nodes. This will initiate a lot of link failures. That is, the link between sources to destination will get broken at different locations on their path because of this false identification of malicious nodes. In this work, periodic trust handshake based detection (PTH-AODV) of black hole attack is proposed. |
Pagination: | 154p. |
URI: | http://hdl.handle.net/10603/352044 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 136.87 kB | Adobe PDF | View/Open |
02_certificate.pdf | 132.42 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 12.44 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 125.94 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 93.44 kB | Adobe PDF | View/Open | |
06_list of important abbreviations.pdf | 13.36 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 11.07 kB | Adobe PDF | View/Open | |
08_list of figures.pdf | 23.29 kB | Adobe PDF | View/Open | |
09_list of publications.pdf | 194.69 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 772.01 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 713.76 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 882.44 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 711.48 kB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 799.4 kB | Adobe PDF | View/Open | |
15_chapter 6.pdf | 131.44 kB | Adobe PDF | View/Open | |
16_references.pdf | 291.77 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 268.65 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: