Department Of Computer Science And Technology
Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/79
Browse
Item Recovery Based Architecture To Protect Hids Log Files Using Time Stamps(ACADEMY PUBLISHER, 2010) Khurana, Surinder Singh; Bansal, Divya; Sofat, SanjeevAfter the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in technology, the threat of attacks through computer networks becomes a large issue. Host Based Intrusion Detection is a part of security system that protects hosts from various kinds of attacks. It also provides a great degree of visibility (of system activities). It is quite widest that HIDS are vulnerable to attacks. An adversary, if successfully enters in a system can disable HIDS or modify HIDS rules to hide its existence. One can easily evade HIDS. In [7] we propose a new architecture that protects HIDS from such attacks. In this paper, we have proposed a new mechanism to check integrity of log files. We have discussed its affects on performance of system.Item DWT-SVD Based robust digital image watermarking using adaptive median filter(Central University of Punjab, 2013) Kumar, Ashok; Brar, Sukhreet SinghFeature Matching is one of the central issues of model-based recognition and an important component of most object recognition systems. The feature matching technique can be applied in image alignment, 3D secure reconstruction, motion tracking, object recognition and in pharmacophore based molecular alignment. Even though numerous algorithms exist for feature recognition and search yet the efficiency of these have considerable room for improvement. This has necessitated a continuous search for better performing algorithms. The combination of geometric hashing technique and tolerance limits for a given set of known interactions can be used for the pharmacophore modelling based search. The algorithm proposed is precise as compared with the previous existing algorithms. This algorithm is better in its runtime complexity.Item Performance analysis of spin protocol under different security threats in wireless sensor networks(Central University of Punjab, 2014) Choudhary, Rohit; Kaur, AmanpreetThe wireless sensor network consists of homogenous sensor nodes with limited energy and computational power which are self organisable. These nodes use radio frequency channels to communicate with each other wirelessly. Besides that wireless sensor networks are resource constrained with low energy and low bandwidth along with shorter communication range. The evolution of VLSI circuit technology has also enabled the development of wireless sensor networks. The ease of deployment and low cost availability of sensor devices has attracted much advancement in wireless sensor networks. The nodes with capabilities of sensing and computing help the administrator to observe particular environment like battle field, climatic conditions and weather forecasting in remote areas etc. This dissertation research is about the study of performance challenges in wireless sensor networks using Sensor Protocol for Information via Negotiation(SPIN) protocol under various security threats and to analyse their impact on SPIN. The empirical study has been carried to validate the issues studied in literature review by simulating the scenarios. On the basis of achieved observations the inference is drawn about the better protocol in sensor network and future recommendations are made for the analysis and enhancement.Item AODV Based Congestion Control Protocols: Review(IJCSIT, 2014) Bhatia, Bandana; Sood, NehaAd- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They have highly deployable, dynamic and self-configurable topologies. Various routing protocols are defined for MANETs. These protocols may follow proactive, reactive or hybrid approach. Due to many number of nodes transmitting packets over the network, the chances of losing the packets over the network increases to a great extent. Also, with the increase in size of data packets, the congestion over the network increases which may lead to packet loses. The existing routing protocols for MANETs do not support congestion control as they are not congestion adaptive. There are many proposed protocols that are congestion adaptive and deals with the congestion over the network. This paper discusses congestion control protocols in MANETs. Also, three congestion control protocols, EDAODV, AODV-I and CRP, are discussed. Simulation results are gathered for AODV by varying the number of nodes and size of the data packets for four performance metrics, namely, throughput, routing overhead, packet delivery ratio and end-to-end delay.Item Analysis of leach protocol for lifetime optimization of wireless sensor networks(Central University of Punjab, 2014) Maurya, Prashant; Kaur, AmanpreetA Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor nods is not possible. So, energy is a most challenging issue in case of WSN. Low-Energy Adaptive Clustering Hierarchy (LEACH) is most significant protocol which consumes less amount of energy while routing the data to the base station (BS). All descendents protocols of LEACH have been discussed in Literature review chapter. Each descendants of LEACH has its merits and demerits which needs improvement. In this research work RCH-LEACH protocol (LEACH protocol using Relay Cluster Head Node) has been proposed using a relay cluster head node (RCH node) in each cluster. RCH-LEACH protocol has been simulated on MATLAB with fixed location of base station and with fixed percentage of cluster heads in the network. Results of RCH-LEACH has been analyzed using parameters like Energy Consumption per Round, Round when First Node Dies (FND), Round when half of Nodes Die (HND), Round when Last Node Dies (LND) and throughput. Analysis of results represent that FND, HND, LND and Throughput of RCH-LEACH are higher and Energy consumption per Round is lower than that of LEACH protocol. So, it can be concluded that RCH-LEACH outperforms LEACH protocol. This RCH model used in RCH-LEACH protocol can be further extended and implemented on other descendant protocols of LEACH to improve them as a part of future work.Item Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing(IJCSIT, 2014) Goyal, Renuka| Sidhu, NavjotNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.Item Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing(IASIR, 2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.Item SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter(Publishing India, 2014) Khurana, Surinder Singh; Kaur, NirmaljeetThe massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy consumption and carbon emission have raised an issue of energy management. Recently, a number of approaches have been proposed to address this issue. Most of these approaches are based upon the proper utilization of the resources. On the other side, to avoid Service Level Agreement (SLA) violations, the servers deployed in data centres can be utilized up to a maximum threshold value. To avoid SLA violation, some virtual machines (VMs) will be migrated from over utilized hosts. Although there are many techniques to select such VMs that can be migrated, but no technique considers Service Level Agreement parameters while selecting such machines. In this paper, SLA based approach to select VMs to migrate from overloaded host has been purposed. The purposed approach will work on the basis of VM categories that are negotiated in service level agreement. The simulation results demonstrate that the proposed approach demands slightly more energy than the other efficient technique (Minimization of Migration). However, it reduces the cost paid in lieu of SLA violation as it reduces SLA violations belonging to VM categories for which SLA violation penalties are higher.Item Security analysis of AODV, ARAN and improved mobile adhoc networks routing protocols(Central University of Punjab, 2014) Goel, Ruby; MeenakshiWireless networks use wireless connections to provide a communication environment between the communicating devices using their radio transmission range. Wireless network doesn?t require any pre-established infrastructure. Adhoc network is an infrastructure-less network which allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile nodes. Wireless communication is guided by routing protocols. Wireless routing protocols come under different categories like- On-demand, Table-driven and secure routing protocols. Wireless networks face many challenges due to limited resources, dynamic topologies and lack of physical security, due to which variety of attacks have been identified that target both the on-demand and table- driven routing protocols. By attacking the routing protocols attacker can absorb network traffic, or can inject the false traffic in the network. Due to this attacks like- Blackhole, IP-Spoofing, False message fabrication, Denial of service, etc. are possible in adhoc networks. Many secure routing protocols have been developed that can deal with these attacks. One of them is Authenticated Routing for Adhoc Network (ARAN) which introduces authentication, message integrity and non- repudiation as part of its security policy and provides security against various network attacks like- Message modification, false message fabrication and impersonation attack. But ARAN is vulnerable to Distributed Denial of Service (DDOS) attack because legitimate nodes can send large amount of unnecessary packets in the network and can create congestion and thus prevent other legitimate nodes to access the network. In this research work security aspects of ARAN have been analyzed with respect to Adhoc On-Demand Distance Vector (AODV) routing protocol under Blackhole and IP-Spoofing attack. Further a technique has been proposed for ARAN to resist DDOS attack by limiting the number of packets per unit of time each node can send in the network and this enhanced ARAN in this research work is called as improved ARAN (i-ARAN). By implementing the proposed technique i- ARAN is able to prevent DDOS attack. Various performance metrics like- Packet Delivery ratio, Average Path Length, Average end-to-end delay and Throughput; iv are calculated under Glomosim-2.03 simulator. Results show that ARAN is safe against Blackhole and IP-Spoofing attack, but AODV is highly vulnerable to both the attacks. Also results of i-ARAN under DDOS attack show that the attack can be prevented by the proposed technique as it provides constant Packet delivery ratio from all the source nodes and throughput of i-ARAN is also approximately constant. By using i-ARAN there is no congestion in the network so average end- to-end delay of i-ARAN is less than the ARAN.Item Advance Stable Election Protocol in Wireless Sensor Network(Excel India Publishers, 2014) Singh, Mandeep; Sidhu, NavjotWireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering is main technique used for this. Various protocols like SEP (Stable Election Protocol) and ESEP (Extended Stable Election Protocol) are clustering based heterogeneous aware protocols. In this paper, a new protocol ASEP (Advance Stable Election Protocol) has been proposed based on SEP. This is based on changing more efficiently and dynamically the cluster head election probability. Performance of this protocol has been evaluated in MATLAB and graphical results have been shown. The performance of ASEP is better than SEP in form of first node dies and total number of packets delivered.Item Improved and rule scheme to increase lifetime of wireless sensor networks(Central University of Punjab, 2014) Saini, Swati; Khurana, Surinder.KWireless sensor network (WSN) is a network of small light weight wireless nodes which are highly distributed and deployed in large numbers. The sensor nodes scan the environment and provide useful information to the user through sink node. One of the major issues in wireless sensor networks is developing an energy-efficient routing technique which has a significant impact on the overall lifetime of the sensor network. Our dissertation work focuses on increasing lifetime of wireless sensor networks. This is done by improving the existing Divide and Rule Scheme which is based on dividing network area into logical divisions to reduce distance for intra cluster and inter cluster communications. Improvement of Divide and Rule Scheme is done by developing a new scheme called Segregated Receive and Relay Scheme in which addition of relay nodes is done in inner and middle regions. The Proposed Scheme results in around 50% increase in lifetime of inner region nodes and leading to overall increase in lifetime of the network. Other parameters such as Delay, Throughput and Packet loss also shows better results in new Scheme.Item To verify the data integrity and third party auditor at user side in cloud computing(Central University of Punjab, 2014) Goyal, Renuka; Sidhu, NavjootNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the Internet based computing which provides users with a number of services. One of the services provided by the cloud computing is data storage. Users store their data in the cloud without the burden of local data storage. But as every technology has some drawbacks, cloud computing also has some drawbacks. The main drawback of cloud computing is the security issues that are associated with it. The security issue with which this dissertation is dealing is the threat to data integrity. As the user no longer has physical possession of data so the integrity of data stored on cloud server become the major concern in the cloud computing. Data stored on the cloud server may be getting corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The Third Party Auditor checks the integrity of data on user demand and the released audit reports not only helps the user to evaluate the risk of their services but also helps the cloud service provider to improve their security mechanism. As a part of verification it is assumed that Third Party Auditor is reliable and independent which does not mean that there is no space for the Third Party Auditor to cheat. So there is need to check the integrity and Third Party Auditor at user side. This dissertation highlights the basics of cloud computing, general model and different approaches used for Third Party Auditor. The model to verify the data integrity and Third Party Auditor is implemented in this dissertation and the results found are good according to the user data.Item Extended stable election protocol with advance probability method in wireless sensor networks(Central University of Punjab, 2014) Singh, Mandeep; Sidhu, NavjootWireless sensor network is an emerging research field. It has gained a lot of attention from industry and academia. Mainly it is used for monitoring and data aggregation from the field. Data is most important in this process as it gives us the useful information. There are lots of techniques to gather data from the field. These techniques or can be said protocols must be energy efficient as this is a main constraint for the sensor nodes having limited battery. Lot of protocols have been designed for this process. LEACH (Low Energy Adaptive Clustering Hierarchy) is a basic protocol that uses clustering. It has significantly increased the life-time of network as compared to old flat protocols. There are various advancements in LEACH. Heterogeneity is also an important matter in sensor network as all the nodes do not lose energy uniformly. SEP (Stable Election Protocol) is a heterogeneous aware protocol based on LEACH and increases the lifetime of the network. ESEP (Extended Stable Election Protocol) is an extended version of the SEP that adds more heterogeneity by adding one more type of nodes. In heterogeneous aware protocols, each type of node has different amount of initial energy. There is a problem that when nodes left with the same amount of residual energy, the probability remains according to initial energy. So a changed ESEP protocol has been proposed. Simulation has been done in MATLAB and proposed protocol gives better performance in terms of first node dies and total number of packets delivered.Item A fault tolerable load balancing technique in cloud computing(Central University of Punjab, 2014) Shiny; Khurana, Surinder.KAs the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the organizations. To better capitalize their investment, the over-equipped organizations open their infrastructures to others by exploiting the Internet and other important technologies such as virtualization by creating a new computing model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the history of computers. However, there are number of technical challenges that need to be tackled which include reliability, resource provisioning, fault tolerance, load balancing and efficient mechanism to increase the service level agreement (SLA) and better use of the resources. The main purpose of this dissertation report is to provide a preface of the topic and to work on the various issues involved in the field of load balancing and fault tolerance i.e. load computation and the distribution of load. Load balancing and fault tolerance in cloud computing have a great impact on the performance of the system. Good load balancing makes cloud computing more efficient by provisioning of resources to cloud users on demand basis in pay-as-you-say manner. Load balancers are used for assigning load to different virtual machines in such a way that none of the nodes gets loaded heavily or lightly. When many clients request the server simultaneously, server is overloaded which causes fault. There are many load balancing algorithms and fault tolerance techniques in order to settle down these issues, but these techniques further had some drawbacks. Das and Khilar (2013) discussed a load balancing technique for virtualization and fault tolerance in cloud computing (LBVFT) to assign the task to the virtual nodes depending upon the success rates (SR) and the previous load history. This v technique tolerates not only the faults but also reduce the chance of future faults by not assigning tasks to virtual nodes of physical servers whose success rates are very low and loads are very high. But there is still a need to provide an efficient load balancing, load migration, load calculation and fault handling technique to make the VFT model more effective.Item Security Enhancement in AODV protocol against Network Layer Attacks(Excel India Publishers, 2014) Singh, Khushmeet; Kaur, AmanpreetA mobile Ad hoc network (MANET) is a wireless decentralized and self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. Each node plays role of both transmitter and receiver. These unique features make MANET suitable for use in various emergency situations. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANET's vulnerable to different attacks. Hence it is vital to develop some security mechanism to protect MANET from attacks. In this paper performance of AODV Protocol is analyzed in presence of two network layer active attacks namely Blackhole and Malicious packet dropping. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. Both these attacks are performed simultaneously on the network. Solution is proposed and simulated to prevent Blackhole attack. Malicious packet dropping attack is prevented by using watchdog intrusion detection system. Both solutions are combined and Performance of AODV and Modified AODV protocol is analysed under both attacks with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead using NS2.Item A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack(IJRET, 2014) Kaur, Gurmeet; Kaur, AmanpreetWireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.Item Performance evaluation of manet routing protocols dsdv, tora enhanced tora(Central University of Punjab, 2014) Kaur, Amandeep; MeenakshiWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the globe. Mobile ad hoc networks (MANETs) are a kind of infrastructure less wireless networks in which all the nodes act as peers and themselves configure the network. Mobile ad hoc networks are an open area of research because of its applicability in a number of areas like tactical networks, emergency services and education. One of the major challenges in networking is the efficient, accurate, reliable, secure and immediate delivery of data from source to destination. Therefore, the efficient routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been developed to send data efficiently across mobile ad hoc networks. These protocols have been divided into three categories- Proactive, Reactive and Hybrid. The performance evaluation of these protocols has been going on since a long time. Most of the current research focuses on the pause times, simulation times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models and traffic patterns. This dissertation work is focused on the improvement of the poor performance of TORA with the rise in number of traffic connections. This behavior has been credited to the link sensing mechanism of Internet MANET Encapsulation protocol (IMEP). IMEP is a multi-purpose network-layer protocol that supports the operation of many routing protocols including TORA. It provides mechanism for sensing the status of links in TORA. This link sensing mechanism has been investigated and proposed modification by K. H. Lim and A. Datta has been implemented to observe improvement in the overall performance of Enhanced-TORA protocol in comparison with original TORA. iv Through this research, investigations have been made into the behavior of DSDV, and TORA mobile ad hoc routing protocols by varying the underlying mobility models (Random Waypoint, Random Direction and Manhattan Grid model) and Traffic patterns (FTP, TELNET, HTTP). The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead, Packet Delivery Ratio and Packet Loss. This research draws an analysis whether under which mobility model and traffic pattern combination these protocols give the best performance. Results show that DSDV gives best performance under Manhattan Grid Mobility model and FTP traffic pattern. Whereas, TORA and Enhanced-TORA give best performance under Random Direction Mobility model and FTP traffic. The performance of Enhanced-TORA is then compared with original TORA using 10 traffic connections under Random Direction mobility model and FTP Traffic and it was observed that Enhanced-TORA outperformed original TORA thereby eliminating the problem of performance degradation with rise in number of connectionsItem Performance analysis of aodv for wormhole attack using different mobility models(Central University of Punjab, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. According to structural arrangement, wireless networks are classified into two main types: fixed infrastructure wireless networks and non-infrastructure wireless networks. Mobile Ad-Hoc Networks (MANETs) fall under the type of infrastructure less wireless networks. Mobile nodes can communicate to each other through wireless links in this type of an autonomous system. At any time, whenever required nodes can join or leave the network as nodes are free to move. Although various routing protocols are used in the communication process but those protocols have numerous security complexities. An intruder can perform many attacks (both active and passive attacks) through different security flaws. Wormhole attack is an active attack in the context of mobile ad-hoc networks that disrupts the normal routing functioning of any routing protocol. In this work, an attempt has been made to analyze and compare the performance of demand oriented or reactive routing protocol: Ad-hoc On Demand Distance Vector (AODV) with two approaches: AODV without wormhole attack and AODV under attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. Evaluation of two examined approaches has been done in terms of performance metrics such as Average Throughput, PDR (Packet Delivery Ratio), Jitter, Average End to End Delay and Packet Drop Rate. An approach has also been used to analyze participated malicious nodes in the wormhole peer list. Along with this, the attack has been detected with the help of metrics such as Average Throughput, Average End to End Delay, Jitter and Packet Delivery Ratio.Item Security in AODV protocol using and hybrid cryptography(Central University of Punjab, 2014) Singh, Khushmeet; Kaur, AmanpreetA mobile Ad hoc network (MANET) is a wireless decentralized self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. These unique features (self-configuring, infrastructure-less, decentralized) make MANET suitable for use in emergency situations, military operations, education, entertainment, sensor networks etc. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANETs vulnerable to various attacks. This dissertation work focuses on network layer attacks. Network layer attacks in MANET are categorized into two basic types namely active and passive. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. In passive attack, the attacker does not disturb the operation of network but attempts to seek some valuable information. So, it is vital to develop some security mechanism to protect MANETs from attacks. This dissertation work focuses on providing solution to prevent MANETs from two active attacks namely Blackhole and Malicious Packet Dropping and one passive attack namely Eavesdroping attack. The existing AODV Protocol is modified to prevent these attacks. Solution is proposed and simulated to prevent Blackhole and Eavesdropping attack. Malicious packet dropping attack is prevented by using Watchdog Intrusion Detection System (IDS). Performance of AODV and Modified AODV protocol is analysed with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead. To prevent Eavesdropping attack, a hybrid cryptography technique has been developed which combines best features of both symmetric key cryptography and asymmetric key cryptography i.e. speed and security. Simulation has been done in Network Simulator version 2.35.Item Mobility model based performance analysis of DSDV mobile ad hoc routing protocol(Institute of Electrical and Electronics Engineers Inc., 2014) Kaur, AmandeepWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the physical location of the devices used by them across the globe. Mobile ad hoc networks are a kind of infrastructure less wireless networks in which all the nodes act as peers and share information as well as resources. Mobile ad hoc networks are an open area of research since these have not been deployed widely yet. Every research in the field of networking focuses on the efficient, accurate, reliable, secure and immediate delivery of data. Therefore, the routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been proposed and implemented to send data efficiently across mobile ad hoc networks. The performance evaluation of these protocols has been going on since a long time. In most of the studies, the focus has been on the variations in pause times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models. Through this paper, investigations have been made into the behavior of DSDV mobile ad hoc routing protocol by varying the underlying mobility models. The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead and Packet Delivery Ratio. ? 2014 IEEE.