Loading...
Please wait, while we are loading the content...
Similar Documents
Attack detection over ad-hoc networks
Content Provider | Indraprastha Institute of Information Technology, Delhi |
---|---|
Author | Sondhi, Devika Dora, Jyotika |
Abstract | Till date, in-depth study of AODV protocol has been carried out through simulation which involved implementing AODV protocol on simulator, carrying out various attacks and detection of those attacks. In simulation, the whole system is controlled by the developer and hence acts as a single logical unit; on the other hand, implementation on real systems involves coordinating various system components. In our research we have implemented AODV protocol on real systems using the AODV-UU (an AODV implementation developed at the University of Uppsala, Sweden), and carried out Flooding, Black Hole and Impersonation attacks. The performance of the protocol during attacks was analysed using metrics like throughput, packet loss and packet delay in our previous work. This report presents real time detection of Flooding attack and Impersonation attack in an ad hoc network. Apart from detection of the attack, possible attacker can also be recognized. Further, we evaluate the implemented detection and recognition mechanisms in case of Flooding and Impersonation Attacks |
File Format | |
Language | English |
Publisher | IIIT Delhi |
Access Restriction | Authorized |
Subject Keyword | Network attacks AODV Real Systems Protocol Security Performance Attack Detection Attacker Recognition |
Content Type | Text |
Educational Degree | Bachelor of Technology (B.Tech.) |
Resource Type | Thesis |
Subject | Data processing & computer science |