Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4092
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dadhania, Avani J. | - |
dc.date.accessioned | 2013-11-28T09:23:43Z | - |
dc.date.available | 2013-11-28T09:23:43Z | - |
dc.date.issued | 2013-06-01 | - |
dc.identifier.uri | http://10.1.7.181:1900/jspui/123456789/4092 | - |
dc.description.abstract | Security techniques have been designed to obtain certain objectives. All networked devices try to manage the network resources themselves which is termed as Availability. Availability ensures that the legitimate users should not be deprived of the basic network resources. Intrusion detection system is required to monitor the network, detect misbehavior or anomalies and notify other nodes in the network to avoid or detect misbehaving nodes. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is an important on-demand reactive routing protocol for mobile ad hoc networks. The ultimate goal of the security solution for wireless network is to provide security services such as authentication, confidentiality, integrity, anonymity and availability to mobile users. This report provides a survey on wormhole attack and its counter measures in ad-hoc wireless network. Also we propose a method to detect Wormhole attack. Wormhole attack and TFSM based Intrusion Detection System is implemented using NS-2 simulator. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 11MCEC06 | en_US |
dc.subject | Computer 2011 | en_US |
dc.subject | Project Report 2011 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 11MCE | en_US |
dc.subject | 11MCEC | en_US |
dc.subject | 11MCEC06 | en_US |
dc.title | Intrusion Detection Scheme to Identify Wormhole Attack in Ad-Hoc Networks | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
11MCEC06.pdf | 11MCEC06 | 628.98 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.