Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
4 results
Search Results
Item Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data(Springer, 2020) Mishra H.K.; Mittal M.Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.Item Wireless sensor network: Routing protocols and attacks - A survey(Institute of Electrical and Electronics Engineers Inc., 2015) Purohit, R.; Sidhu, N.Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though purposive, there are some constraints of the sensor nodes due to computing power, storage capacity and limited power. In this review article, we will discuss wireless sensor network's architecture. Further, we will discuss classification of routing protocols according to some factors and summaries on their mode of operation. Lastly, we put up a comparative study on these protocols. ? 2015 IEEE.Item Analysis of VANET geographic routing protocols on real city map(Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, H.; MeenakshiVehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET protocols are classified as topology based and position based protocols. Research showed that position based protocols are more suited to VANETs as compared to topology based protocols because geographic routing does not involve an overhead and delay of maintaining routing tables instead geographic position of nodes is used for routing which can be obtained by Global Positioning System (GPS) device on vehicles. In this paper, two geographic routing protocols Anchor based Street and Traffic Aware Routing (A-STAR) and Greedy Perimeter Stateless Routing (GPSR) protocols are evaluated on real city map. Simulation of VANETs on real map scenarios provide accurate results and also useful to design and deploy VANETs in real world. Real world mobility model is important because it reflects real-world performance of protocols considered. Analysis of performance is carried in terms of throughput, packet delivery ratio, packet loss and average delay. Simulation of protocols is carried by varying density of nodes. A-STAR showed better performance on real city map over GPSR because A-STAR adopted Street awareness method of routing whereas GPSR works on Greedy forwarding and Routing around the perimeter methods. ? 2017 IEEE.Item Analysis of MAODV MANET routing protocol on different mobility models(Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, N.MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET relies on the cooperation of nodes for communication. In MANET, communication between the nodes is possible with the help of protocols which are categorized into three types like reactive, proactive and hybrid. In the reactive category of protocol, a path is established at the real time. In the proactive category, protocols have predefined routing tables for each node. The hybrid category is the combination of both these categories. Modified Ad-hoc On-Demand Distance Vector (MAODV) is the reactive protocol which defines all possible routes among source node and the destination node which are maintained during data transmission. In the case of a disappointment of definite route, the data packets are transferred through secondary routes which were established with the help of routing tables that stores the multiple route paths to the destination. In the real world, nodes in MANET are allowed to transfer in any direction. Thus movement models like Random Way Point (RWP), Random Walk (RW), Random Direction (RD) and Gauss-Markov (GM) are taken as they have different mobility patterns. Therefore, M-AODV is implemented over different mobility models to compute parameters like End to End Delay (E2E Delay), Average Hop Count (AHC), and Throughput. ? 2017 IEEE.