DOC PREVIEW
MASON ECE 636 - Attacks in Ad-Hoc Networks and Modeling in NS-2

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Attacks in Ad-Hoc Networks and Modeling in NS-2 Name: Mehul Revankar Student ID: 000146544 Introduction: Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, I study the attacks that are possible in Ad-Hoc networks faces and means to model the same in Network Simulator-2. Project Specification: In this project I propose to classify the attacks that are possible in Ad-Hoc networks and then make attempt to model them in Network Simulator -2. I plan to give a brief overview on how NS-2 works and how attacks can be simulated in NS-2. Schedule: 1. March 23 – Complete study of possible attacks in Ad-Hoc Networks 2. April 6 – Classification of attacks and means to model them. 3. April 20 _ Results of the project Table of contents: 1. Introduction to Ad-Hoc networks 2. Operation of DSR 3. Operation of AODV 4. Attacks in Ad-Hoc networks. 5. Classification of attacks in Ad-Hoc networks 6. Modeling of attacks 7. Results 8. ConclusionReference: 1. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks ”, MobiCom 2002, September 23-28, 2002, Atlanta, Georgia, USA 2. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Technical Report TR01384, Department of Computer Science, Rice University, June 2002, 3. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no.6 4. Security in Ad Hoc Networks Vesa Krpijoki Helsinki University of Technology 5. Y. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Perrig, and D. B. Johnson 6. A Secure Routing Protocol for Ad Hoc Networks Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer 7.


View Full Document

MASON ECE 636 - Attacks in Ad-Hoc Networks and Modeling in NS-2

Documents in this Course
Load more
Download Attacks in Ad-Hoc Networks and Modeling in NS-2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Attacks in Ad-Hoc Networks and Modeling in NS-2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Attacks in Ad-Hoc Networks and Modeling in NS-2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?