Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 7 of 7
  • Item
    Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data
    (Springer, 2020) Mishra H.K.; Mittal M.
    Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.
  • Item
    Wireless sensor network: Routing protocols and attacks - A survey
    (Institute of Electrical and Electronics Engineers Inc., 2015) Purohit, R.; Sidhu, N.
    Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though purposive, there are some constraints of the sensor nodes due to computing power, storage capacity and limited power. In this review article, we will discuss wireless sensor network's architecture. Further, we will discuss classification of routing protocols according to some factors and summaries on their mode of operation. Lastly, we put up a comparative study on these protocols. ? 2015 IEEE.
  • Thumbnail Image
    Item
    Performance analysis of AODV based congestion control protocols in MANET
    (Institute of Electrical and Electronics Engineers Inc., 2015) Bhatia, B.
    MANETs are highly deployable, dynamic and self-configurable because of which routing is an extremely challenging task in them. AODV routing protocol used for routing purposes in MANETs is an on-demand routing protocol which do not support congestion control as it is not congestion adaptive. This paper discusses two congestion control protocols based on AODV in MANETs. Many authors have proposed protocols based on AODV which are congestion adaptive and deal with the congestion over the network. AODV-I and EDAODV are two congestion control protocols which deals with the congestion reactively. These two protocols are simulated on NS2 by varying the size of data packets. The analysis of these protocols is done with AODV by calculating the values for four performance metrics, namely, throughput, packet delivery ratio (PDR), routing overhead and end-to-end delay. ? 2015 IEEE.
  • Thumbnail Image
    Item
    Mobility model based performance analysis of DSDV mobile ad hoc routing protocol
    (Institute of Electrical and Electronics Engineers Inc., 2014) Kaur, Amandeep
    Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the physical location of the devices used by them across the globe. Mobile ad hoc networks are a kind of infrastructure less wireless networks in which all the nodes act as peers and share information as well as resources. Mobile ad hoc networks are an open area of research since these have not been deployed widely yet. Every research in the field of networking focuses on the efficient, accurate, reliable, secure and immediate delivery of data. Therefore, the routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been proposed and implemented to send data efficiently across mobile ad hoc networks. The performance evaluation of these protocols has been going on since a long time. In most of the studies, the focus has been on the variations in pause times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models. Through this paper, investigations have been made into the behavior of DSDV mobile ad hoc routing protocol by varying the underlying mobility models. The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead and Packet Delivery Ratio. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, Meenakshi
    The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.
  • Item
    Analysis of VANET geographic routing protocols on real city map
    (Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, H.; Meenakshi
    Vehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET protocols are classified as topology based and position based protocols. Research showed that position based protocols are more suited to VANETs as compared to topology based protocols because geographic routing does not involve an overhead and delay of maintaining routing tables instead geographic position of nodes is used for routing which can be obtained by Global Positioning System (GPS) device on vehicles. In this paper, two geographic routing protocols Anchor based Street and Traffic Aware Routing (A-STAR) and Greedy Perimeter Stateless Routing (GPSR) protocols are evaluated on real city map. Simulation of VANETs on real map scenarios provide accurate results and also useful to design and deploy VANETs in real world. Real world mobility model is important because it reflects real-world performance of protocols considered. Analysis of performance is carried in terms of throughput, packet delivery ratio, packet loss and average delay. Simulation of protocols is carried by varying density of nodes. A-STAR showed better performance on real city map over GPSR because A-STAR adopted Street awareness method of routing whereas GPSR works on Greedy forwarding and Routing around the perimeter methods. ? 2017 IEEE.
  • Item
    Analysis of MAODV MANET routing protocol on different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, N.
    MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET relies on the cooperation of nodes for communication. In MANET, communication between the nodes is possible with the help of protocols which are categorized into three types like reactive, proactive and hybrid. In the reactive category of protocol, a path is established at the real time. In the proactive category, protocols have predefined routing tables for each node. The hybrid category is the combination of both these categories. Modified Ad-hoc On-Demand Distance Vector (MAODV) is the reactive protocol which defines all possible routes among source node and the destination node which are maintained during data transmission. In the case of a disappointment of definite route, the data packets are transferred through secondary routes which were established with the help of routing tables that stores the multiple route paths to the destination. In the real world, nodes in MANET are allowed to transfer in any direction. Thus movement models like Random Way Point (RWP), Random Walk (RW), Random Direction (RD) and Gauss-Markov (GM) are taken as they have different mobility patterns. Therefore, M-AODV is implemented over different mobility models to compute parameters like End to End Delay (E2E Delay), Average Hop Count (AHC), and Throughput. ? 2017 IEEE.