You are on page 1of 15

Title of Thesis

Adissertation
Submitted in partial fulfillment of the requirement for the award of
Degree of
BACHELOR OF ENGINEERING
IN
ELECTRICAL AND ELECTRONICS ENGINEERING

Submitted to

RAJIV GANDHI PROUDYOGIKI VISHWAVIDHYALAYA,


BHOPAL (M.P.)

Submitted by
Student Name
(Enrollment Number)

Under the Supervision of


Name of the Guide
Designation
Department of Electrical and Electronics Engineering

DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING


ORIENTAL INSTITUTE OF SCIENCE & TECHNOLOGY,
BHOPAL (M.P.)-462021, INDIA
Submission Month-Year
ORIENTAL INSTITUTE OF SCIENCE & TECHNOLOGY
Accredited by National Board of Accreditation, New Delhi
Approved by AICTE, New Delhi & Govt. of M.P. Affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Oriental Campus, Thakral Nagar, Raisen Road, Bhopal-462 022 (M.P.) INDIA

BONAFIDE CERTIFICATE

This is to certify that the dissertation entitled“Name of project” has been


carried out by Student Name (Enrollment Number)student of “Bachelors of
Engineering in Electrical and Electronics Engineering” under our
supervision and guidance in the “Department of Electrical and Electronics
Engineering.

Date:
Place: Bhopal

APPROVED & SUPERVISED BY:

Guide Name
SUPERVISOR
(Designation)
Department Name
OIST, Bhopal

FORWARDED BY:

Name of HOD Dr. A. K. Tiwari


(Professor and HOD) Director
Department Name OIST, Bhopal
OIST, Bhopal
ORIENTAL INSTITUTE OF SCIENCE & TECHNOLOGY
Accredited by National Board of Accreditation, New Delhi
Approved by AICTE, New Delhi & Govt. of M.P. Affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Oriental Campus, Thakral Nagar, Raisen Road, Bhopal-462 022 (M.P.) INDIA

CERTIFICATE OF APPROVAL

The dissertation entitled “Name of project” being submitted by “Student


Name (Enrollment Number)”has been examined by us and is hereby approved
for the award of degree Bachelors of Engineering in Electrical and
Electronics Engineering for which it has been submitted. It is understood that
by this approval the undersigned do not necessarily endorse or approve any
statement made, opinion expressed or conclusion drawn therein, but approve the
dissertation only for the purpose for which it has been submitted.

(Internal Examiner) (External Examiner)


Date: Date:
ORIENTALINSTITUTE OF SCIENCE & TECHNOLOGY
Accredited by National Board of Accreditation, New Delhi
Approved by AICTE, New Delhi & Govt. of M.P. Affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Oriental Campus, Thakral Nagar, Raisen Road, Bhopal-462 022 (M.P.) INDIA

DECLARATION

I Student Name, student of Bachelors of Engineering in ELectrical


and Electronics Engineering, Oriental Institute of Science & Technology,
Bhopal (M.P), hereby declare that the work presented in this dissertation
entitled “Name of project”is the outcome of my own work, is bonafide and
correct to the best of my knowledge and this work has been carried out taking
care of engineering ethics. The work presented does not infringe any patented
work and has not been submitted to any other University or anywhere else for
the award of any degree or any professional diploma.

Student Name
(Enrolment Number)
ORIENTALINSTITUTE OF SCIENCE & TECHNOLOGY
Accredited by National Board of Accreditation, New Delhi
Approved by AICTE, New Delhi & Govt. of M.P. Affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Oriental Campus, Thakral Nagar, Raisen Road, Bhopal-462 022 (M.P.) INDIA

DECLARATION

I hereby declare that the dissertation entitled “Name of project” is being


submitted on the partial fulfillment for the award of the degree of Master of
Technology in “Name of Branch”. The work has been carried out in the
department of “Name of Department” (Oriental Institute of Science &
Technology, Bhopal) is an authentic record of my own work carried under the
guidance of “Name of Guide”.I have not submitted the matter embodied in this
report for award of any degree.
I also declare that “A check for Plagiarism has been carried out on the
thesis / project / dissertation and is found within the acceptable limit and report
of which is enclosed herewith”.

Date:
Place: Bhopal

Student Name
(Enrollment No.)

Guide Name
SUPERVISOR
(Designation)
Department Name
OIST, Bhopal

Director / Principal Sign with Seal


ACKNOWLEDGEMENT

This Dissertation is the result of guidance and support of various people at Oriental institute
of science and technology, without whom all my effort would have been directionless and
fruitless. I sincerely thank all of them, for assisting me in completing the dissertation.

I express my heartfelt and profound gratitude to Dr. A.K.Tiwari Director OIST Bhopal for
his valuable suggestions at all stages of my research work.

I express my ardent and earnest gratitude to my guide Dr.Monika Jain, Head of Department
of Electrical and Electronics Engineering Department, OIST Bhopal, for his help and
encouragement at all the stages of my dissertation. His guidance and motivation helped me to
be fruitful in my effort.

Finally, I would like to say that I am indebted to my parents for everything that they have
done for me. All of this would have been impossible without their constant support. And I
also thank to God for being kind to me and driving me through this journey.

Student Name
(Enrollment Number)
TABLE OF CONTENT

ABSTRACT...............................................................................................................................i

LIST OF TABLE...........................................................................................................ii

LIST OF FIGURE...........................................................................................................iii

LIST OF GRAPH.....................................................................................................................v

LIST OF ABBREVATION................................................................................................vi

CHAPTER-1: INTRODUCTION

1.1 Introduction.................................................................................................................01

1.2 Mobile Ad-hoc Network................................................................................................03

1.3 Features of MANET..................................................................................................04

1.4 Application of MANET...............................................................................................07

1.5 Wireless Network Taxonomy........................................................................................10

1.6 Routing Protocol in MANET.......................................................................................10

1.6.1 Proactive protocol............................................................................................11

1.6.2 Reactive protocol.........................................................................................12

1.5.3 Hybrid protocol............................................................................................13

1.6 Problem Statement.....................................................................................................13

1.7 Objectives........................................................................................................................13

CHAPTER-2: AODV ROUTING PROTOCOL AND ATTACKS

2.1 AODV Routing Protocol……………...........................................................................15

2.2 Routing Security…………............................................................................................18

2.3 Attack on AODV Protocol…………………………………….........................................19

2.3.1 Basic Attacks………………………………….................................................19

2.3.2 Black Hole Attack……………………….........................................................21

2.3.3 Passive Eavesdropping…………………..........................................................23

2.3.4 Gray Hole attack……………………………………………………..................23

Oriental Institute of Science and Technology, Bhopal


2.3.5 Denial of Service attack………….....................................................................24

2.3.6 Impersonation…………………………............................................................24

2.3.7 Routing Attacks………………………...........................................................24

CHAPTER – 3: LITERATURE SURVEY

3.1 Literature Survey…………………………………….....................................................25

3.1.1 Next Hop Information Based Scheme………………........................................25

3.1.2 The IDAD Mechanism………………...............................................................27

3.1.3 Rule based Detection Method........................................................................28

3.1.4 Optimal Path & Hash based Scheme…..........................................................29

3.1.5 Local Intrusion Detection Mechanism…..........................................................30

3.1.6 Enhanced Route Discovery AODV…................................................................31

3.1.7 Forced Routing Information Modification Model…...........................................31

3.1.8 Secure AODV…..............................................................................................32

3.1.9 IDS Using Fuzzy Logic………………..............................................................32

3.1.10 IDS Using Genetic Algorithm........................................................................32

3.1.11 A Trust Based Approach For AODV Protocol to Mitigate Black


Hole Attack InMANET…………………………………….............................33

3.1.12 A Robust Approach To Detect And Prevent Network


Layer Attack in MANETS……......................................................................33

3.1.12 A Robust Approach To Detect And Prevent Network Layer


Attack in MANETs........................................................................................34

3.1.14 Hybrid Detector for Detection Of Black Holes In MANETS….......................34

3.1.15 Smart Handling of Colluding Black Hole Attacks In MANETs


And Wireless Sensor Networks Using Multipath Routing...............................35

3.1.16 Implementing And Improving The Performance Of AODV


By Receive Reply Method and Securing It from Black Hole Attack................35

3.1.17 QOSofMANETthrough Trust Based AODV Routing Protocol By


Exclusion of Black Hole Attack………….....................................................36
3.1.18 Various Security Attacks And Trust Based Security Architecture

Oriental Institute of Science and Technology, Bhopal


For MANET......................................................................................................36

3.1.19 Wormhole Attack Detection In MANETs Using Route Redundancy


And Time-Based Hop Calculation..................................................................37

3.1.20 A Robust Approach To Detect And Prevent Network Layer


Attack inMANETs……………...................................................................38

3.1.21 ALARM: Anonymous Location-Aided Routing


In Suspicious MANETs.....................................................................................39

3.1.22 Wormhole Attack: A New Detection Technique............................................43

3.1.23 MANET Routing Protocols and Wormhole


Attack against AODV....................................................................................44

3.1.24 Preventing Cooperative Black Hole Attacks inMANET:


Simulation, Implementation and Evaluation.................................................45

3.1.25 Other Researches........................................................................................46

CHAPTER- 4: PROPOSED TECHNIQUE

4.1 Real-World Components of A Mobile Ad-Hoc Network..................................................54

4.2 Intrinsic Expectations From Simulators........................................................................55

4.3 Proposed Approach....................................................................................................56

4.3.1 Reinforce Route Discovery Method for AODV.................................................56

4.3.1 Route Discovery Phase.....................................................................................57

4.3.2 Communication between Source and Destination without Attack.....................58

4.4 Simulation of Black Hole Attack.......................................................................................61

4.5Detection & Prevention of Attack....................................................................................64

CHAPTER – 5: SIMULATION ENVIRONMENT

5.1 Introduction of NS2……………………………………..................................................67

5.2 Basic Architecture………………......................................................................................67

5.3 NS2 Installation…………….............................................................................................69

Oriental Institute of Science and Technology, Bhopal


5.3.1 Installing an All-In-One NS2 Suite on Unix-Based Systems………….............69

5.3.2 Installing an All-In-One NS2 Suite on Windows-Based Systems………..........70

5.4 Network Animator (NAM) Trace………………..........................................................70

5.5 Linkage between OTCL and C++ in NS2………….......................................................71

5.6 Implementation Of Discrete-Event Simulation In Ns2………..........................................72

5.6.1 NS2 Simulation


Concept…………….................................................................72

5.7 The Simulator………………......................................................................................73

5.7.1 Main Components of a Simulation Interpreted Hierarchy………......................74

5.8 Overview Of Ns2 Components…………......................................................................74

5.8.1 Functionality-Based Classification of NS2 Modules……………......................74

CHAPTER – 6: EXPERIMENTAL SETUP AND ANALYSIS

6.1 Implementation Details................................................................................................76

6.1.1 Simulation Environment.............................................................................76

5.2 Simulation Parameters..................................................................................................77

CHAPTER- 6: CONCLUSION AND FUTURE WORK

6.1 Conclusion and Future Work.....................................................................................88

References....................................................................................................................89

Publications..................................................................................................................99

Plagiarism Report ……………………………………………………………………………

Oriental Institute of Science and Technology, Bhopal


Oriental Institute of Science and Technology, Bhopal
ABSTRACT

Oriental Institute of Science and Technology, Bhopal Page | i


LIST OF TABLE

Table 2.1: Attacks in MANET.........................................................................................19

Table 3.1: Literature Survey.............................................................................................52

Table 6.1: Simulation Parameters.....................................................................................78

Table 6.2: Packet Transferred


Analysis.........................................................................................................81

Table 6.3: Detailed Analyses of Packet Transferred.............................................................82

Table 6.4: Complete Network Analysis.............................................................................83

Oriental Institute of Science and Technology, Bhopal Page | ii


LIST OF FIGURE

Fig 1.1 MobileAd-hoc Network..............................................................................................03

Fig 1.2: Source to destination multi-hop routes.................................................................07

Fig 1.3: Routing Protocols in MANET............................................................................11

Fig 2.1: Route Discovery Phase of AODV......................................................................21

Fig 2.2: Flow chart of Route Discovery of AODV...........................................................17

Fig 2.3: Security attacks classification.............................................................................21

Fig 2.4: Black Hole Attack..............................................................................................23

Fig 3.1 Propagation of Further Request............................................................................25

Fig.3.2 Path of Further Reply.........................................................................................26

Fig.3.3 Rule based detection method process.....................................................................29

Fig.4.1 Snapshot of Route Discovery Phase (Source 21- Destination 18)..............................58

Fig.4.2 Snapshot of Source 21 to Destination 18 communication...........................................59

Fig 4.3 Screenshot of Source 14 -Destination 18 Communication........................................60

Fig 4.4 Screenshot of Source17 - Destination 18 Communication........................................60

Fig 4.5 Black Hole attack (BH Node 1)............................................................................62

Fig 4.6 Black Hole attack (BH Node 13)...........................................................................63

Fig 4.7 Black Hole Attack (BH Node 7)............................................................................64

Fig 4.8 Communication after Detection of attack (BH node 1)...............................................65

Fig 4.9 Communication after Detection of attack (BH node 13..............................................65

Fig 4.10Communication after Detection of attack (BH node 7)…………………………........66

Oriental Institute of Science and Technology, Bhopal Page | iii


LIST OF GRAPHS

Graph 6.1: Packet Transferred in Network at Different Scenario........................................81

Graph 6.2: Throughput of Network at Different Scenario.....................................................84

Graph 6.3: Packet Delivery Ratio of Network at Different Scenario.................................85

Graph 6.4: End to End Delay of Network at Different Scenario.............................................87

Oriental Institute of Science and Technology, Bhopal Page | iv

You might also like