Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/352044
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2021-12-22T05:20:58Z-
dc.date.available2021-12-22T05:20:58Z-
dc.identifier.urihttp://hdl.handle.net/10603/352044-
dc.description.abstractMobile Adhoc network (MANETs) applications are increasing every day due to inherent characteristics like infrastructure less nature, dynamic topology and multi-hop network. The path from source node to destination node is determined with the help of set of rules known as routing protocol. In MANETs, the routing protocols are divided into two major categories like proactive and reactive. This work discusses the Adhoc On-demand Distance Vector Routing Protocol (AODV), a kind of reactive routing protocol, for its study and modification. But MANETs is also vulnerable to number of attacks due to its nature. A lot of work has been done to make it more secure. In this work, the impacts of some of the popular attacks on a short term military rescue mission like MANETs scenario is studied. In particular, three attacks being studied on AODV routing protocol are a) Jellyfish attack b) Black hole attack c) Selfish node attack. To have the better analysis, the network size is varied firstly and then the number of malicious node is varied. Detection of malicious nodes is a challenging task. Further, isolating such malicious nodes from communication is also a great challenge. The trust based on the packet forwarding behaviour of neighbor can be used for detecting misbehaviour as discussed in previous works in literature. This model has been already presented in several works. But, by the same trust based logic, some of the neighbors those who were silent and not actively participated in communications will get wrongly identified as malicious. So, simple trust based models will mark a lot of non-malicious nodes as malicious nodes. This will initiate a lot of link failures. That is, the link between sources to destination will get broken at different locations on their path because of this false identification of malicious nodes. In this work, periodic trust handshake based detection (PTH-AODV) of black hole attack is proposed.
dc.format.extent154p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDesign and Development of An Efficient Secure AODV Routing Protocol
dc.title.alternative
dc.creator.researcherSingla, Bhawna
dc.subject.keywordAODV
dc.subject.keywordManets
dc.subject.keywordSecure Routing Protocols
dc.description.note
dc.contributor.guideVerma, Anil and Raheja, L.R.
dc.publisher.placePatiala
dc.publisher.universityThapar Institute of Engineering and Technology
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered
dc.date.completed2018
dc.date.awarded
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File136.87 kBAdobe PDFView/Open
02_certificate.pdf132.42 kBAdobe PDFView/Open
03_abstract.pdf12.44 kBAdobe PDFView/Open
04_acknowledgement.pdf125.94 kBAdobe PDFView/Open
05_table of contents.pdf93.44 kBAdobe PDFView/Open
06_list of important abbreviations.pdf13.36 kBAdobe PDFView/Open
07_list of tables.pdf11.07 kBAdobe PDFView/Open
08_list of figures.pdf23.29 kBAdobe PDFView/Open
09_list of publications.pdf194.69 kBAdobe PDFView/Open
10_chapter 1.pdf772.01 kBAdobe PDFView/Open
11_chapter 2.pdf713.76 kBAdobe PDFView/Open
12_chapter 3.pdf882.44 kBAdobe PDFView/Open
13_chapter 4.pdf711.48 kBAdobe PDFView/Open
14_chapter 5.pdf799.4 kBAdobe PDFView/Open
15_chapter 6.pdf131.44 kBAdobe PDFView/Open
16_references.pdf291.77 kBAdobe PDFView/Open
80_recommendation.pdf268.65 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: