Show simple item record

dc.contributor.authorGoel, Ruby
dc.date.accessioned2018-08-31T04:13:40Z
dc.date.available2018-08-31T04:13:40Z
dc.date.issued2014
dc.identifier.citationGoel, Ruby (2014) Security analysis of AODV, ARAN and improved mobile adhoc networks routing protocols.en_US
dc.identifier.urihttp://kr.cup.edu.in/handle/32116/1834
dc.description.abstractWireless networks use wireless connections to provide a communication environment between the communicating devices using their radio transmission range. Wireless network doesn?t require any pre-established infrastructure. Adhoc network is an infrastructure-less network which allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile nodes. Wireless communication is guided by routing protocols. Wireless routing protocols come under different categories like- On-demand, Table-driven and secure routing protocols. Wireless networks face many challenges due to limited resources, dynamic topologies and lack of physical security, due to which variety of attacks have been identified that target both the on-demand and table- driven routing protocols. By attacking the routing protocols attacker can absorb network traffic, or can inject the false traffic in the network. Due to this attacks like- Blackhole, IP-Spoofing, False message fabrication, Denial of service, etc. are possible in adhoc networks. Many secure routing protocols have been developed that can deal with these attacks. One of them is Authenticated Routing for Adhoc Network (ARAN) which introduces authentication, message integrity and non- repudiation as part of its security policy and provides security against various network attacks like- Message modification, false message fabrication and impersonation attack. But ARAN is vulnerable to Distributed Denial of Service (DDOS) attack because legitimate nodes can send large amount of unnecessary packets in the network and can create congestion and thus prevent other legitimate nodes to access the network. In this research work security aspects of ARAN have been analyzed with respect to Adhoc On-Demand Distance Vector (AODV) routing protocol under Blackhole and IP-Spoofing attack. Further a technique has been proposed for ARAN to resist DDOS attack by limiting the number of packets per unit of time each node can send in the network and this enhanced ARAN in this research work is called as improved ARAN (i-ARAN). By implementing the proposed technique i- ARAN is able to prevent DDOS attack. Various performance metrics like- Packet Delivery ratio, Average Path Length, Average end-to-end delay and Throughput; iv are calculated under Glomosim-2.03 simulator. Results show that ARAN is safe against Blackhole and IP-Spoofing attack, but AODV is highly vulnerable to both the attacks. Also results of i-ARAN under DDOS attack show that the attack can be prevented by the proposed technique as it provides constant Packet delivery ratio from all the source nodes and throughput of i-ARAN is also approximately constant. By using i-ARAN there is no congestion in the network so average end- to-end delay of i-ARAN is less than the ARAN.en_US
dc.language.isoen_USen_US
dc.publisherCentral University of Punjaben_US
dc.subjectAODVen_US
dc.subjectARANen_US
dc.subjectBlackholeen_US
dc.subjectIP-Spoofingen_US
dc.subjectDDOSen_US
dc.subjectGloMoSim-203en_US
dc.titleSecurity analysis of AODV, ARAN and improved mobile adhoc networks routing protocolsen_US
dc.typeMaster Dissertationen_US
dc.contributor.supervisorMeenakshi
dc.identifier.accessionnoT00143


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record