Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/574562
Title: A Secure Multiphase Detection And Analysis of Malicious Node Behaviour in MANETs
Researcher: Deepthi,V S
Guide(s): Vagdevi, S
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2022
Abstract: MANETs, or mobile ad hoc networks, are said to be decentralized with fewer infrastructures, with each device acting as a forwarding router and sending packets as routers do in the network. Whenever there is a need for data transfer, the node will identify its neighboring nodes and the data will transfer to the destination through them. Due to its major characteristics like its dynamic topology and insecure medium, it is prone to various categories of attacks. newlineThe most prevalent well-accepted and best routing mechanism which are having large usage in MANET is an AODV, an on-demand, routing. In many situations, an AODV standard is influenced by many attacks wherein the node intends to send fictitious routing reply information stating to the respective sender that it is having a very direct path to the receiver, but rather the intention is to drop the packet. These categories of attacks are called black-hole attacks. newlineIn this report, MANET s performance is investigated by considering single and also multiple Blackhole attacker nodes. And further, the intrusion detection system for identifying the blackhole attack is analyzed. The proposed methodologies are implemented in NS-2.35 and NS-3.25 platforms and the outcomes are discussed by considering various network configurations like average goodput, delay from end to end, the overall count of lost packets, and jitter. Results also demonstrated that the testing is carried out by using both UDP packets and TCP packets. newlineFurther, the various types of attacks are predicted by leveraging several machine learning methods and algorithms, and the capability of the learning approaches like accuracy , precision, and recall are analyzed with its results. As a result, the detection rates of Black hole attacks are discussed by changing the network settings like the count of attacker nodes, number of nodes, mobility range, energy consumption, and bandwidth. Different types of attacks are classified and learning model parameters are compared against the traditional machine learning ap
Pagination: 110
URI: http://hdl.handle.net/10603/574562
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File31.83 kBAdobe PDFView/Open
02_prelim pages.pdf210.2 kBAdobe PDFView/Open
03_content.pdf110.58 kBAdobe PDFView/Open
04_abstract.pdf84.89 kBAdobe PDFView/Open
05_chapter 1.pdf701.62 kBAdobe PDFView/Open
06_chapter 2.pdf70.16 kBAdobe PDFView/Open
07_chapter 3.pdf124.53 kBAdobe PDFView/Open
08_chapter 4.pdf123.95 kBAdobe PDFView/Open
08_chapter 5.pdf29.71 kBAdobe PDFView/Open
10_annexures.pdf176.91 kBAdobe PDFView/Open
11_chapter 6.pdf527.16 kBAdobe PDFView/Open
12_chapter 7.pdf288.78 kBAdobe PDFView/Open
13_chapter 8.pdf846.52 kBAdobe PDFView/Open
14_chapter 9.pdf29.74 kBAdobe PDFView/Open
80_recommendation.pdf72.67 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: