Presentation is loading. Please wait.

Presentation is loading. Please wait.

S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul.

Similar presentations


Presentation on theme: "S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul."— Presentation transcript:

1 S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul

2  Ad hoc network does not have the centralized control  Ad hoc networks are more vulnerable to attacks  Internal attack and External attack  Data forwarding attack is internal attack INTRODUCTION

3 A BSTRACT  Survivability is the ability of network to provide essential services in presence of attacks  Data forwarding attack is dropping of packets by selfish nodes in network  Normal Data transfer using AODV and DSR protocols is analysed  AODV and DSR Protocol are enhanced for data forwarding attack  Data transfer using AODV and DSR protocol with data forwarding attack is analysed

4 Existing System  Capable of defending itself against malicious nodes and other different attacks  Not capable of defending itself against any selfish nodes which is already authenticated in network Proposed System  Capable of defending itself against authenticated selfish nodes participating in the network  Done by Score based scheme to detect selfish nodes using logfile

5 Module 1: Analysis of normal behaviour of AODV & DSR protocols  Data forwarded between two nodes through set of nodes using AODV protocol  Trace file is analysed by using Perl program  Packet delivery Ratio is calculated  Procedure is repeated for DSR protocol  Compare the packet delivery ratio of the two protocol

6

7

8

9

10

11

12

13

14

15 Module 2: Analysis of behaviour of AODV protocol in the presence of packet forwarding attack  Enhance AODV protocol by Score based authentication scheme  Selfish node which perform the data forwarding attack is included in the network  Data transferred between two nodes through selfish node  Packet Delivery Ratio is calculated  Selfish node is detected by using logfile

16

17

18

19 Module 3: Analysis of behaviour of DSR protocol in the presence of packet forwarding attack  Enhance DSR protocol by score based authentication scheme  Selfish node which perform the data forwarding attack is included in the network  Data transferred between two nodes through selfish node  Packet Delivery Ratio is calculated  Compare the Packet delivery Ratio of the two protocol

20 Software Requirements  Operating system : Ubuntu 10.14  Simulation Environment : NS 2.35  Language: OTCL  Documentation Tool :Ms Word 2007 Hardware Specification  RAM : 32 bit 1Gb and above  Processor :32 bit dual core  Hard Disk :80 Gb and above

21 Build network Data packet transfer between two nodes Find number of packets received at destination Introduce selfish node Enhance AODV& DSR protocol Compare packet delivery ratio of AODV & DSR protocols Analysis trace file using Perl program Find number of data packets originated in source Find packet delivery ratio

22


Download ppt "S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul."

Similar presentations


Ads by Google