Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/363255
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | 1-174 | |
dc.date.accessioned | 2022-02-17T05:40:54Z | - |
dc.date.available | 2022-02-17T05:40:54Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/363255 | - |
dc.description.abstract | A Mobile Ad-hoc Network (MANET) is an infrastructure-less, self-healing, autonomous, network of mobile devices. These features of a MANET make it vulnerable to various attacks. One such attack is a wormhole attack (or wormhole tunnel), which if present in the MANET, would create the illusion of a low (or high) per-hop delay through the malicious nodes. Using this illusion, the malicious nodes disrupt the routing procedures and attract traffic for analysis or dropping. Two or more malicious nodes collude and create such a wormhole tunnel. Existing literature assumes that the wormholes (colluding nodes) are located at a large distance from each other or create a shorter path by manipulating the hops in between. Because of this, the path through colluding nodes could have higher delay than the average per-hop delay, of a network. However, this assumption would not hold in presence of newer routing protocols such as Lightweight On-demand Ad-hoc Distance-vector Routing Protocol - Next Generation (LOADng), which enforce jitter while forwarding the packets, to avoid collisions. We propose JITWORM-1 and JITWORM-2 algorithms, which can detect wormholes in presence of variable delay (jitter). Our algorithm assumes that the colluding nodes do not apply jitter to the packet so that their chances of appearing on a path increase. JITWORM-1 and JITWORM-2 detect wormholes by each node monitoring and analyzing the average jitter application behavior of other neighboring nodes. If the percentage of packets to which jitter is not applied exceeds a set threshold, then a wormhole is assumed to be present. After successful detection of a wormhole, it is isolated from the network, and the detecting node discovers an alternate path. | |
dc.format.extent | 1-174 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Wormhole Attach Detection in Presence of Variable Delay in Presence of Variable Delay in Mobile Ad Hoc Network | |
dc.title.alternative | ||
dc.creator.researcher | Bagade Sudhir Tanbaji | |
dc.subject.keyword | Engineering | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Engineering Electrical and Electronic | |
dc.subject.keyword | Mobile Ad-hoc Network | |
dc.description.note | ||
dc.contributor.guide | Raisinghani Vijay | |
dc.publisher.place | Mumbai | |
dc.publisher.university | Narsee Monjee Institute of Management Studies | |
dc.publisher.institution | Department of Electronic Engineering | |
dc.date.registered | 2013 | |
dc.date.completed | 2018 | |
dc.date.awarded | 2018 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Electronic Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 205.28 kB | Adobe PDF | View/Open |
02_certificates.pdf | 157.61 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 179.73 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 250.76 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 728.22 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 636.38 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 851.93 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 2.47 MB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 168.55 kB | Adobe PDF | View/Open | |
15_references.pdf | 307.17 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 115.39 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: