Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/469220
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-03-15T05:21:19Z | - |
dc.date.available | 2023-03-15T05:21:19Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/469220 | - |
dc.description.abstract | newlineMobile ad-hoc wireless networks (MANETs) are self configured, self organized, short lived, dynamic networks which can be deployed anywhere, anytime within limited area without any infrastructure setup. Mobile ad hoc network is a wireless network of mobile nodes with no infrastructure like access point which reduces deployment time and set up cost of network. Nodes in MANET are free to move anywhere in any direction due to changing network topology. The every node in ad hoc network forwards packets for other nodes to discover routes acting as a router. Any two nodes in network communicate directly with each other if both nodes are in transmission range otherwise they need the help of other nodes to forward packets to communicate. MANETs are becoming popular due to prolific use of easily available, cheaper mobile devices and advancement in wireless technologies. The main objective of a routing protocol is to find and maintain routes due to link breakages and forged routes. There are three categories of routing protocols used in MANET such as table driven routing protocols, reactive (or on-demand) protocols and hybrid protocols depending upon routing table updation mechanism. The three most widely used routing protocols in Manet are Dynamic Source Routing Protocol(DSR), Destination Sequenced Distance Vector Routing Protocol(DSDV), Adhoc On demand Distance Vector Routing Protocol (AODV). The peculiar and distinctive characteristics of MANET like unpredictable node movement, no centralized control, and stringent constraints of resources make security a challenging issue in MANET. These routing protocols are highly vulnerable to security threats which can disturb routing mechanism. Mobile ad hoc networks have various security threats such as modification attack, replay attack, black hole attack, spoofing attack, wormhole attack. In our work, we address the issue of black hole attack on AODV routing protocol and propose a technique to avoid black hole and find secure route between sending node and destination node.In our work, we have focused on AODV, most promising routing technique of MANET which is vulnerable to black hole problem. Black hole is an unsolved hazard to functionality of routing behavior and network mechanism of MANET caused due to newlineiv newlinefaulty and misbehaving node. Our work proposes an effective solution to diminish bad effect of black hole and find trusted secure route using Diffe-Hellman and Backtrace-AODV method. Extensive simulation results show that our proposed method performs very well in thwarting black holes from MANET. Our proposed solution performs well than normal AODV with less packet loss, more mean hop, more throughput and packet delivery ratio. In planning of our research work, we have following objectives. | |
dc.format.extent | All pages | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Investigation on Secure Routing Protocols for Mobile Adhoc Networks | |
dc.title.alternative | ||
dc.creator.researcher | Dinesh | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Telecommunications | |
dc.description.note | ||
dc.contributor.guide | Ajay Kumar and Jatinder Singh | |
dc.publisher.place | Kapurthala | |
dc.publisher.university | I. K. Gujral Punjab Technical University | |
dc.publisher.institution | Department of Computer Applications | |
dc.date.registered | 2011 | |
dc.date.completed | 2019 | |
dc.date.awarded | 2019 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 39.86 kB | Adobe PDF | View/Open |
02_prelim page.pdf | 171 kB | Adobe PDF | View/Open | |
03_content.pdf | 119.02 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 53.07 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 246.67 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 216.51 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 678.7 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 1.05 MB | Adobe PDF | View/Open | |
09_annexure.pdf | 141.22 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 66.64 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: