Professional Documents
Culture Documents
Deepika. V
(12MCA0073)
[SITE]
MAY, 2015
ATTACK
IN
MANET
USING
AODV
ROUTING
Vellore:
Date:
ii
ATTACK
IN
MANET
USING
AODV
ROUTING
Internal Examiner
External Examiner
Approved by
Program Chair
Dean
MCA
ACKNOWLEDGEMENT
It is my pleasure to express with deep sense of gratitude to Dr. K. John Singh,
School of Information Technology & Engineering (SITE), VIT University, for his
constant guidance, continual encouragement, and understanding, more than all, he
taught me patience in my endeavor. My association with him is not confined to
academics only, but it is a great opportunity on my part of work with an
intellectual and expert in the field of network security. I would like to express my
gratitude to Dr. G.Viswanathan, Mr. G.V.Selvam, Dr. V. Raju, Dr. S. Narayanan,
and Dean Dr. K. Ganesan, School of Information Technology and Engineering, for
providing with an environment to work in and for his inspiration during the tenure
of the course. In jubilant mood I express ingeniously my whole-hearted thanks to
Program Chair Dr. Jeyanthi. N, all teaching staff and members working as limbs of
our university for their not-self-centered enthusiasm coupled with timely
encouragements showered on me with zeal, which prompted the acquirement of
the requisite knowledge to finalize my course study successfully. I hereby thank
MCA Project coordinator, Dr. Prabukumar M - SITE, Assistant Professor (SG) for
their valuable suggestions and continuous support throughout my MCA course. I
would like to thank my parents for their support. It is indeed a pleasure to thank
my friends who persuaded and encouraged me to take up and complete this task.
At last but not least, I express my gratitude and appreciation to all those who have
helped me directly or indirectly toward the successful completion of this project.
Place: Vellore
Date:
Deepika. V
iv
ABSTRACT
TABLE OF CONTENTS
CHAPTER NO.
TITLE
PAGE NO.
iii
ABSTRACT
vi
LIST OF FIGURES
LIST OF TABLES
Xi
LIST OF ABBREVIATIONS
xii
1.
INTRODUCTION
2.
LITERATURE SURVEY
2. 3 MANET
2.6 E-HSAM
12
13
2.10 DAWN
14
15
18
3.1 Objective
18
3.
vi
3.1.1 MANET
18
19
19
19
22
3.3 Drawback
24
3.4 Solution
24
26
27
27
30
3.7.2 Monitoring
33
3.7.3 Self-Destruction
34
36
36
37
37
38
39
40
3.9 Testing
40
vii
41
40
42
42
42
42
42
3.9.6.3
Setting
Up
Testing
Environment
3.9.6.4 Adding Test Scripts and Test
Data to the Project
4.
5.
42
42
IMPLEMENTATION
43
4.1 Basics
43
4.1.1 Starting NS
44
46
47
50
53
56
CONCLUSION
58
REFERENCES
59
viii
LIST OF FIGURES
FIGURE NO
TITLE
PAGE NO.
1.1
In Band Channel
1.2
3.1
23
3.2
27
3.3
29
3.4
29
3.5
32
3.6
32
3.7
32
3.8
32
3.9
35
3.10
36
3.11
37
3.12
38
3.13
39
3.14
40
3.15
42
ix
4.1
NAM Window
45
4.2
48
4.3
Event Scheduler
51
4.4
51
4.3
Nodes Initiated
53
4.4
53
4.5
54
4.6
54
4.7
55
4.8
56
4.9
Average Throughput
56
LIST OF TABLES
TABLE NO
TITLE
PAGE NO.
3.1
Routing Table
34
4.1
52
4.2
Simulation Setup
52
xi
LIST OF ABBREVIATIONS
MANET
CN
Current Node
PN
Priority Node
SPN
TTL
Time To Live
MN
Malicious Node
AODV
xii