Download presentation
Presentation is loading. Please wait.
Published byMelinda Carr Modified over 8 years ago
1
S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul
2
Ad hoc network does not have the centralized control Ad hoc networks are more vulnerable to attacks Internal attack and External attack Data forwarding attack is internal attack INTRODUCTION
3
A BSTRACT Survivability is the ability of network to provide essential services in presence of attacks Data forwarding attack is dropping of packets by selfish nodes in network Normal Data transfer using AODV and DSR protocols is analysed AODV and DSR Protocol are enhanced for data forwarding attack Data transfer using AODV and DSR protocol with data forwarding attack is analysed
4
Existing System Capable of defending itself against malicious nodes and other different attacks Not capable of defending itself against any selfish nodes which is already authenticated in network Proposed System Capable of defending itself against authenticated selfish nodes participating in the network Done by Score based scheme to detect selfish nodes using logfile
5
Module 1: Analysis of normal behaviour of AODV & DSR protocols Data forwarded between two nodes through set of nodes using AODV protocol Trace file is analysed by using Perl program Packet delivery Ratio is calculated Procedure is repeated for DSR protocol Compare the packet delivery ratio of the two protocol
15
Module 2: Analysis of behaviour of AODV protocol in the presence of packet forwarding attack Enhance AODV protocol by Score based authentication scheme Selfish node which perform the data forwarding attack is included in the network Data transferred between two nodes through selfish node Packet Delivery Ratio is calculated Selfish node is detected by using logfile
19
Module 3: Analysis of behaviour of DSR protocol in the presence of packet forwarding attack Enhance DSR protocol by score based authentication scheme Selfish node which perform the data forwarding attack is included in the network Data transferred between two nodes through selfish node Packet Delivery Ratio is calculated Compare the Packet delivery Ratio of the two protocol
20
Software Requirements Operating system : Ubuntu 10.14 Simulation Environment : NS 2.35 Language: OTCL Documentation Tool :Ms Word 2007 Hardware Specification RAM : 32 bit 1Gb and above Processor :32 bit dual core Hard Disk :80 Gb and above
21
Build network Data packet transfer between two nodes Find number of packets received at destination Introduce selfish node Enhance AODV& DSR protocol Compare packet delivery ratio of AODV & DSR protocols Analysis trace file using Perl program Find number of data packets originated in source Find packet delivery ratio
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.