Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4092
Title: Intrusion Detection Scheme to Identify Wormhole Attack in Ad-Hoc Networks
Authors: Dadhania, Avani J.
Keywords: Computer 2011
Project Report 2011
Computer Project Report
Project Report
11MCE
11MCEC
11MCEC06
Issue Date: 1-Jun-2013
Publisher: Institute of Technology
Series/Report no.: 11MCEC06
Abstract: Security techniques have been designed to obtain certain objectives. All networked devices try to manage the network resources themselves which is termed as Availability. Availability ensures that the legitimate users should not be deprived of the basic network resources. Intrusion detection system is required to monitor the network, detect misbehavior or anomalies and notify other nodes in the network to avoid or detect misbehaving nodes. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is an important on-demand reactive routing protocol for mobile ad hoc networks. The ultimate goal of the security solution for wireless network is to provide security services such as authentication, confidentiality, integrity, anonymity and availability to mobile users. This report provides a survey on wormhole attack and its counter measures in ad-hoc wireless network. Also we propose a method to detect Wormhole attack. Wormhole attack and TFSM based Intrusion Detection System is implemented using NS-2 simulator.
URI: http://10.1.7.181:1900/jspui/123456789/4092
Appears in Collections:Dissertation, CE

Files in This Item:
File Description SizeFormat 
11MCEC06.pdf11MCEC06628.98 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.