Computer Science And Technology - Master Dissertation
Permanent URI for this collection
Browse
Browsing Computer Science And Technology - Master Dissertation by Subject "AODV"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Effect of improved IEEE 802.11 DCF on the performance of manets(Central University of Punjab, 2014) Hans, Shifali; Sood, NehaWireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication and networking world and have led us to the new direction of 'Infrastructure-less networking i.e. Mobile ad hoc Networks'. Mobile ad hoc networks (MANETs) are the wireless infrastructure less networks that do not require any sort of central access point. Nodes in MANETs are connected by the wireless links and they are free to move arbitrarily in any direction. The attractive features of MANETs help to set up a network in emergency situations where the infrastructure is not available or not possible. Even though MANETs have emerged to be attractive, and they hold great promises for our future, but there are several challenges that need to be addressed. The wireless medium is the open shareable; so many-a-times nodes compete among themselves for the medium access, and the conflict arises. In order to resolve the medium contention among nodes there are medium access control techniques. IEEE 802.11 DCF is the de-facto medium access protocol. However there are some problems in IEEE 802.11 DCF which need to be attended for the better MANET performance. The objective of the dissertation work is to study the IEEE 802.11 DCF performance. The performance of 802.11 have been deduced and analysed by running a simulation in NS2 and then have been comparing to the performance of the modified IEEE 802.11 DCF with AODV and DSR routing protocol.Item Performance analysis of aodv for wormhole attack using different mobility models(Central University of Punjab, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. According to structural arrangement, wireless networks are classified into two main types: fixed infrastructure wireless networks and non-infrastructure wireless networks. Mobile Ad-Hoc Networks (MANETs) fall under the type of infrastructure less wireless networks. Mobile nodes can communicate to each other through wireless links in this type of an autonomous system. At any time, whenever required nodes can join or leave the network as nodes are free to move. Although various routing protocols are used in the communication process but those protocols have numerous security complexities. An intruder can perform many attacks (both active and passive attacks) through different security flaws. Wormhole attack is an active attack in the context of mobile ad-hoc networks that disrupts the normal routing functioning of any routing protocol. In this work, an attempt has been made to analyze and compare the performance of demand oriented or reactive routing protocol: Ad-hoc On Demand Distance Vector (AODV) with two approaches: AODV without wormhole attack and AODV under attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. Evaluation of two examined approaches has been done in terms of performance metrics such as Average Throughput, PDR (Packet Delivery Ratio), Jitter, Average End to End Delay and Packet Drop Rate. An approach has also been used to analyze participated malicious nodes in the wormhole peer list. Along with this, the attack has been detected with the help of metrics such as Average Throughput, Average End to End Delay, Jitter and Packet Delivery Ratio.Item Performance evaluation of AODV based congestion control protocols in manet(Central University of Punjab, 2014) Bhatia, Bandana; Sood, NehaThe network in which the users communicate with each other by forming a temporary network without any centralized administration is known as ad hoc network. Every node in ad hoc network acts both as a host as well as a router. The topology of these networks is highly deployable, dynamic and self-configurable. Because of the dynamic topology of Mobile Ad hoc Networks (MANETs), routing is an extremely challenging task in them. For ensuring reliable and efficient routing in MANETs, different routing protocols are defined. These routing protocols may follow proactive, reactive or hybrid approach. As many number of mobile nodes are transmitting the packets over the network, the chances of losing the packets over the network increases to a great extent due to link failures or may be due to congestion over the network because of large traffic flowing over the network. Also, when the size of data packets increases, it may lead to the congestion over the network which ultimately leads to the loss of packets. The existing routing protocols for MANETs do not support congestion control as they are not congestion adaptive. Many authors have proposed protocols based on Ad hoc On demand Distance Vector Routing Protocol (AODV) which are congestion adaptive and deal with the congestion over the network. This dissertation work discusses the congestion control protocols in MANETs and focuses on two congestion control protocols, AODV-I and EDAODV. Simulation results are gathered for AODV, AODV-I and EDAODV by varying the number of nodes and size of the data packets for four performance metrics, namely, routing overhead, throughput, end- to-end delay and packet delivery ratio (PDR).Item Security analysis of AODV, ARAN and improved mobile adhoc networks routing protocols(Central University of Punjab, 2014) Goel, Ruby; MeenakshiWireless networks use wireless connections to provide a communication environment between the communicating devices using their radio transmission range. Wireless network doesn?t require any pre-established infrastructure. Adhoc network is an infrastructure-less network which allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile nodes. Wireless communication is guided by routing protocols. Wireless routing protocols come under different categories like- On-demand, Table-driven and secure routing protocols. Wireless networks face many challenges due to limited resources, dynamic topologies and lack of physical security, due to which variety of attacks have been identified that target both the on-demand and table- driven routing protocols. By attacking the routing protocols attacker can absorb network traffic, or can inject the false traffic in the network. Due to this attacks like- Blackhole, IP-Spoofing, False message fabrication, Denial of service, etc. are possible in adhoc networks. Many secure routing protocols have been developed that can deal with these attacks. One of them is Authenticated Routing for Adhoc Network (ARAN) which introduces authentication, message integrity and non- repudiation as part of its security policy and provides security against various network attacks like- Message modification, false message fabrication and impersonation attack. But ARAN is vulnerable to Distributed Denial of Service (DDOS) attack because legitimate nodes can send large amount of unnecessary packets in the network and can create congestion and thus prevent other legitimate nodes to access the network. In this research work security aspects of ARAN have been analyzed with respect to Adhoc On-Demand Distance Vector (AODV) routing protocol under Blackhole and IP-Spoofing attack. Further a technique has been proposed for ARAN to resist DDOS attack by limiting the number of packets per unit of time each node can send in the network and this enhanced ARAN in this research work is called as improved ARAN (i-ARAN). By implementing the proposed technique i- ARAN is able to prevent DDOS attack. Various performance metrics like- Packet Delivery ratio, Average Path Length, Average end-to-end delay and Throughput; iv are calculated under Glomosim-2.03 simulator. Results show that ARAN is safe against Blackhole and IP-Spoofing attack, but AODV is highly vulnerable to both the attacks. Also results of i-ARAN under DDOS attack show that the attack can be prevented by the proposed technique as it provides constant Packet delivery ratio from all the source nodes and throughput of i-ARAN is also approximately constant. By using i-ARAN there is no congestion in the network so average end- to-end delay of i-ARAN is less than the ARAN.Item Security in AODV protocol using and hybrid cryptography(Central University of Punjab, 2014) Singh, Khushmeet; Kaur, AmanpreetA mobile Ad hoc network (MANET) is a wireless decentralized self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. These unique features (self-configuring, infrastructure-less, decentralized) make MANET suitable for use in emergency situations, military operations, education, entertainment, sensor networks etc. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANETs vulnerable to various attacks. This dissertation work focuses on network layer attacks. Network layer attacks in MANET are categorized into two basic types namely active and passive. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. In passive attack, the attacker does not disturb the operation of network but attempts to seek some valuable information. So, it is vital to develop some security mechanism to protect MANETs from attacks. This dissertation work focuses on providing solution to prevent MANETs from two active attacks namely Blackhole and Malicious Packet Dropping and one passive attack namely Eavesdroping attack. The existing AODV Protocol is modified to prevent these attacks. Solution is proposed and simulated to prevent Blackhole and Eavesdropping attack. Malicious packet dropping attack is prevented by using Watchdog Intrusion Detection System (IDS). Performance of AODV and Modified AODV protocol is analysed with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead. To prevent Eavesdropping attack, a hybrid cryptography technique has been developed which combines best features of both symmetric key cryptography and asymmetric key cryptography i.e. speed and security. Simulation has been done in Network Simulator version 2.35.