Browsing by Author "Kaur, Amanpreet"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
Item Analysis of leach protocol for lifetime optimization of wireless sensor networks(Central University of Punjab, 2014) Maurya, Prashant; Kaur, AmanpreetA Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor nods is not possible. So, energy is a most challenging issue in case of WSN. Low-Energy Adaptive Clustering Hierarchy (LEACH) is most significant protocol which consumes less amount of energy while routing the data to the base station (BS). All descendents protocols of LEACH have been discussed in Literature review chapter. Each descendants of LEACH has its merits and demerits which needs improvement. In this research work RCH-LEACH protocol (LEACH protocol using Relay Cluster Head Node) has been proposed using a relay cluster head node (RCH node) in each cluster. RCH-LEACH protocol has been simulated on MATLAB with fixed location of base station and with fixed percentage of cluster heads in the network. Results of RCH-LEACH has been analyzed using parameters like Energy Consumption per Round, Round when First Node Dies (FND), Round when half of Nodes Die (HND), Round when Last Node Dies (LND) and throughput. Analysis of results represent that FND, HND, LND and Throughput of RCH-LEACH are higher and Energy consumption per Round is lower than that of LEACH protocol. So, it can be concluded that RCH-LEACH outperforms LEACH protocol. This RCH model used in RCH-LEACH protocol can be further extended and implemented on other descendant protocols of LEACH to improve them as a part of future work.Item Behavior analysis of LEACH protocol(Institute of Electrical and Electronics Engineers Inc., 2014) Maurya, Prashant; Kaur, Amanpreet; Choudhary, RohitA wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor nodes is not possible. So, energy is a most challenging issue in case of WSN. Low-Energy Adaptive Clustering Hierarchy (LEACH) is the first significant protocol which consumes less amount of energy while routing the data to the base station. In this paper LEACH protocol has been analyzed with different percentage of cluster heads at different locations of base station in the network. ? 2014 IEEE.Item A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack(IJRET, 2014) Kaur, Gurmeet; Kaur, AmanpreetWireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.Item Performance analysis of aodv for wormhole attack using different mobility models(Central University of Punjab, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. According to structural arrangement, wireless networks are classified into two main types: fixed infrastructure wireless networks and non-infrastructure wireless networks. Mobile Ad-Hoc Networks (MANETs) fall under the type of infrastructure less wireless networks. Mobile nodes can communicate to each other through wireless links in this type of an autonomous system. At any time, whenever required nodes can join or leave the network as nodes are free to move. Although various routing protocols are used in the communication process but those protocols have numerous security complexities. An intruder can perform many attacks (both active and passive attacks) through different security flaws. Wormhole attack is an active attack in the context of mobile ad-hoc networks that disrupts the normal routing functioning of any routing protocol. In this work, an attempt has been made to analyze and compare the performance of demand oriented or reactive routing protocol: Ad-hoc On Demand Distance Vector (AODV) with two approaches: AODV without wormhole attack and AODV under attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. Evaluation of two examined approaches has been done in terms of performance metrics such as Average Throughput, PDR (Packet Delivery Ratio), Jitter, Average End to End Delay and Packet Drop Rate. An approach has also been used to analyze participated malicious nodes in the wormhole peer list. Along with this, the attack has been detected with the help of metrics such as Average Throughput, Average End to End Delay, Jitter and Packet Delivery Ratio.Item Performance analysis of spin protocol under different security threats in wireless sensor networks(Central University of Punjab, 2014) Choudhary, Rohit; Kaur, AmanpreetThe wireless sensor network consists of homogenous sensor nodes with limited energy and computational power which are self organisable. These nodes use radio frequency channels to communicate with each other wirelessly. Besides that wireless sensor networks are resource constrained with low energy and low bandwidth along with shorter communication range. The evolution of VLSI circuit technology has also enabled the development of wireless sensor networks. The ease of deployment and low cost availability of sensor devices has attracted much advancement in wireless sensor networks. The nodes with capabilities of sensing and computing help the administrator to observe particular environment like battle field, climatic conditions and weather forecasting in remote areas etc. This dissertation research is about the study of performance challenges in wireless sensor networks using Sensor Protocol for Information via Negotiation(SPIN) protocol under various security threats and to analyse their impact on SPIN. The empirical study has been carried to validate the issues studied in literature review by simulating the scenarios. On the basis of achieved observations the inference is drawn about the better protocol in sensor network and future recommendations are made for the analysis and enhancement.Item Security Enhancement in AODV protocol against Network Layer Attacks(Excel India Publishers, 2014) Singh, Khushmeet; Kaur, AmanpreetA mobile Ad hoc network (MANET) is a wireless decentralized and self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. Each node plays role of both transmitter and receiver. These unique features make MANET suitable for use in various emergency situations. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANET's vulnerable to different attacks. Hence it is vital to develop some security mechanism to protect MANET from attacks. In this paper performance of AODV Protocol is analyzed in presence of two network layer active attacks namely Blackhole and Malicious packet dropping. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. Both these attacks are performed simultaneously on the network. Solution is proposed and simulated to prevent Blackhole attack. Malicious packet dropping attack is prevented by using watchdog intrusion detection system. Both solutions are combined and Performance of AODV and Modified AODV protocol is analysed under both attacks with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead using NS2.Item Security in AODV protocol using and hybrid cryptography(Central University of Punjab, 2014) Singh, Khushmeet; Kaur, AmanpreetA mobile Ad hoc network (MANET) is a wireless decentralized self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. These unique features (self-configuring, infrastructure-less, decentralized) make MANET suitable for use in emergency situations, military operations, education, entertainment, sensor networks etc. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANETs vulnerable to various attacks. This dissertation work focuses on network layer attacks. Network layer attacks in MANET are categorized into two basic types namely active and passive. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. In passive attack, the attacker does not disturb the operation of network but attempts to seek some valuable information. So, it is vital to develop some security mechanism to protect MANETs from attacks. This dissertation work focuses on providing solution to prevent MANETs from two active attacks namely Blackhole and Malicious Packet Dropping and one passive attack namely Eavesdroping attack. The existing AODV Protocol is modified to prevent these attacks. Solution is proposed and simulated to prevent Blackhole and Eavesdropping attack. Malicious packet dropping attack is prevented by using Watchdog Intrusion Detection System (IDS). Performance of AODV and Modified AODV protocol is analysed with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead. To prevent Eavesdropping attack, a hybrid cryptography technique has been developed which combines best features of both symmetric key cryptography and asymmetric key cryptography i.e. speed and security. Simulation has been done in Network Simulator version 2.35.