Browsing by Subject "AODV,"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item An Approach for Performance Enhancement of Secure Routing Protocols in Mobile Ad Hoc Networks(Pulchowk Campus, 2015-11) Timilsena, Santosh RajMobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure. Although the principle of wireless, structure-less and dynamic networks is attractive, there are still some major flaws that prevent its commercial expansion. Security is one of these main barriers. The open and dynamic operational environment of MANET makes it vulnerable to various network attacks. The security goals can be achieved using secure routing protocols. Ad hoc On-demand Distance Vector (AODV) is one of the most widely used routing protocols that is currently undergoing extensive research. This thesis presents the AODV protocol and surveys security enhancements using both cryptographic and trust based approaches. The impact of security features on routing performance was analyzed. The addition of a trust based approach with cryptographic features reduces routing overheads significantly. The proposed mechanism offers more resilience to attack from malicious nodes, while also promotes collaboration among cooperative nodes and penalizes selfish nodes. The simulation results show that the proposed trust model increases routing efficiency and reliability at cost of delay.Item PROVENANCE BASED MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORK USING BLOOM FILTER(Pulchowk Campus, 2021-08) Kandel, RoshanWireless Sensor Networks (WSN) are essential in modern day to gain information about the environmental studies that are useful in decision making. Data is transferred through wireless medium, so the integrity of the data has to be maintained. We have created a model that helps to securely transmit the data from source node to base station. We have implied provenance based bloom filter and cryptographic algorithm to securely transmit data to the base station. We have also created a model to detect packet dropping malicious node when data is in transit. In our model, we have used AODV protocol as a routing algorithm and AES-128 as a cryptographic algorithm to encrypt the data during transmission. Bloom filter requires a hashing algorithm so in our case SHA-224 cryptographic hashing algorithm has been deployed. We used a light weight Bloom filter model to transmit the data and to detect any packet dropping node which act as an intermediate nodes. We used provenance information to help detect any malicious packet dropping nodes. We relied on provenance encoding and decoding methods to our model. We analyzed our model using different parameters like Verification failure rate (VFR), True false positive (TFP), throughput, end to end delay, etc on different number of nodes, packet size and bloom filter size.