Attacks in Ad-Hoc Networks and Modeling in NS-2 Name: Mehul Revankar Student ID: 000146544 Introduction: Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, I study the attacks that are possible in Ad-Hoc networks faces and means to model the same in Network Simulator-2. Project Specification: In this project I propose to classify the attacks that are possible in Ad-Hoc networks and then make attempt to model them in Network Simulator -2. I plan to give a brief overview on how NS-2 works and how attacks can be simulated in NS-2. Schedule: 1. March 23 – Complete study of possible attacks in Ad-Hoc Networks 2. April 6 – Classification of attacks and means to model them. 3. April 20 _ Results of the project Table of contents: 1. Introduction to Ad-Hoc networks 2. Operation of DSR 3. Operation of AODV 4. Attacks in Ad-Hoc networks. 5. Classification of attacks in Ad-Hoc networks 6. Modeling of attacks 7. Results 8. ConclusionReference: 1. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks ”, MobiCom 2002, September 23-28, 2002, Atlanta, Georgia, USA 2. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Technical Report TR01384, Department of Computer Science, Rice University, June 2002, 3. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no.6 4. Security in Ad Hoc Networks Vesa Krpijoki Helsinki University of Technology 5. Y. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Perrig, and D. B. Johnson 6. A Secure Routing Protocol for Ad Hoc Networks Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer 7.
View Full Document