Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
5 results
Search Results
Item Prevention of black hole attack over AODV and DSR MANET routing protocol(WARSE, 2015) Sharma, Shabnam; Mittal, MeenakshiWireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized administration. They are infrastructure-less networks. They do not contain any networking device like routers or access points. MANETs are self-starting and dynamicnetwork comprising of mobile nodes. Mobile Ad-hoc networks require routing protocols for communication among nodes. Due to the lack of centralized management, various attacks are possible in MANETs such as passive or active attacks. Blackhole attack is an active kind of attack in which a malicious node pretendsto have a shortest and fresh path to the destination. Blackhole attack affects the performance by disrupting the normal communication in the network. Therefore, there is need to prevent the network from attack. In this paper, prevention of blackhole attack is done over AODV and DSR routing protocol with Random Waypoint Model. Malicious nodes in the network are known and if malicious nodes encounter in between the route from source to destination, then intermediate node have to simply discard that path and have to find an alternate path.The simulation results show that AODV routing protocol performs best and is suitable for highly dynamic networks.Item Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.(IJRET, 2015) Rani, Komal; Mittal, MeenakshiVehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic efficiency as well as comfort to both drivers and passengers. There are different types of attacks possible on VANET. In this paper, implementation and prevention of DOS attack is done on topology based protocol- Dynamic Source Routing (DSR). The performance of DSR protocol is evaluated under different scenarios using Network Simulator (NS2), Simulation of Urban Mobility (SUMO) simulator and Mobility model generator for Vehicular networks(MOVE). The prevention scheme Queue Limiting Algorithm (QLA) proposed by Sinha & Mishra is implemented to prevent Denial of Service attack. The results show that DSR has high throughput and packet delivery ratio at low density of nodes and the value of these parameters become low at high density of nodes. The prevention scheme is capable to prevent DOS attack.Item Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System(IJCTT, 2015) Gagandeep; Mittal, MeenakshiDistributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically exhausts bandwidth, processing capacity, or memory of a targeted machine, service or network. DRDOS attack reflects the traffic through reflector that becomes difficult to trace back the real attacker. Prevention and detection of a DRDOS attack is an important research topic for researchers throughout the world. Despite enormous efforts in combating DRDOS attacks in the past decade, DRDOS attacks are still a serious threat to the security of cyberspace. So a defence mechanism is used to combat the Distributed Reflected Denial of Service Attack by using additional hardware called Graphical Processing Unit (GPU) with victim�s machine called hybrid computing system. The results show that the hybrid (CPU-GPU) computing machine can handle the amplified response (i.e. 33 times more than the request packet) more efficiently than the normalmachine (with only CPU).Item A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model(IJRET, 2014) Kaur, Amandeep; Mittal, MeenakshiWireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery RatioItem Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models(Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, MeenakshiThe performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.