Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/610295
Title: An Integrated Approach For Detecting And Preventing Mobile Ad Hoc Networks MANET From Wormhole Attack And Jellyfish Attack
Researcher: Thapar,Shruti
Guide(s): Sharma,Sudhir Kumar
Keywords: Engineering
Engineering and Technology
Instruments and Instrumentation
University: Jaipur National University
Completed Date: 2024
Abstract: Advancement in wireless technology with hand-held computing devices has brought a revolutionary change to the world of mobile communication. Ad hoc networks are mostly suited in infrastructure less and cost effective environment. Frequent changes in the network topology and limited battery access are the big challenges to create an ad hoc network as the nodes are free to move anywhere. Due to such conditions, availability of the routes depends on the neighboring links or nodes to form a best possible route in the ad hoc networks. newline newlineDistributedcommunicationsystems likee-commerce,peer-to-peernetworks, social networks and mobile ad hoc network requires equal cooperation among the participating nodes to ensure the sustainability and existence of network services throughout the acquired area. Sudden entry of any other nodes like selfish and misbehaving nodeswill causeharmto thenetwork.Therefore, network security and trustworthiness factor are the essential issues in MANET especially when it comesto size, mobility and complexity of the network. To handle these issues trust management techniques are to be used for proper cooperation of the nodes during routing process. newline newlineThe main goal of this thesis is to provide detection and prevention policies for two different harmful attacks i.e. wormhole attack and jellyfish attack in the network zone area to take care of trust and security issues. The techniques used in this thesis are delay per hop technique (DELPHI) and Direct trust based technique (DTD) for error free and attack free environment creation in the ad hoc networks. Thesetechniquesarecomparedaltogetherand analyzedthat,through whichpossible way attacks can be fully detected and prevented through the ad hoc networks. Forthe simulation part we have used NS-2 simulator for the best pictorial graphs way out. newlineKeywords: MANET, Security, Trust management, Intrusion Detection and Prevention, Attacks, wormhole Attack, Jellyfish attack, DELPHI technique, DTD technique etc. newline newline newline
Pagination: 
URI: http://hdl.handle.net/10603/610295
Appears in Departments:electronics and communication engineering

Files in This Item:
File Description SizeFormat 
2. prelim pages.pdfAttached File805.33 kBAdobe PDFView/Open
3. contents.pdf110.78 kBAdobe PDFView/Open
4. abstract.pdf26.13 kBAdobe PDFView/Open
80_recommendation.pdf42.12 kBAdobe PDFView/Open
90_plagiarism_report.pdf53.74 kBAdobe PDFView/Open
annexures.pdf159.52 kBAdobe PDFView/Open
chapter 1.pdf179.86 kBAdobe PDFView/Open
chapter 2.pdf355.91 kBAdobe PDFView/Open
chapter 3.pdf194.8 kBAdobe PDFView/Open
chapter 4.pdf169.24 kBAdobe PDFView/Open
chapter 5.pdf1.41 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).

Altmetric Badge: