Professional Documents
Culture Documents
SLNO
ABBREVATION
WMN
ETT
WCETT
DESCRIPTION
ETC
OLSR
DSDV
Destination-Sequenced Distance-Vector
CHGSR
AODV
Four Generation
10
DSR
Third Generation
11
RREQ
Route Request
12
RREP
Routing Reply
13
MAC
14
QOS
Quality Of Service
15
MC
Mesh Clients
16
MR
Mesh Routers
17
WSN
18
MPR
Multi-path Routing
19
SPR
20
AP
Access Point
21
ACK
Acknowledgement
22
Java VM
23
JDBC
24
Java API
25
ODBC
26
RDBMS
27
JDK
LIST OF FIGURES
FIG NO
1.1
FIG NAME
Infrastructure of Wireless Mesh Network
1
PAGE NO
3
4.2.1
System architecture
31
4.2.2
32
5.2.1(a)
36
5.2.1(b)
36
5.2.2
37
7.2.1
54
7.2.2
55
7.2.3
55
7.2.4
56
7.2.5
56
7.2.6
57
7.2.7
57
7.2.8
58
7.2.9
58
7.2.10
59
7.2.11
60
7.2.12
60
7.2.13
61
7.2.14
62
7.2.15
62
7.2.16
63
ABSTRACT
Wireless ad hoc networks are defenceless to uniqueness based assaults
because they dont have the centralized server to control the communication nodes in
the network, so many attacks like injecting the malicious nodes by adversaries, false
identity creation for nodes and also including spoofing attacks, such that drastically
collision or reduce the overall routine of wireless networks. Conservatively, make
confident the uniqueness of the conversationalist and perceiving an adversarial or
attackers presence is executed through cryptographic validation. Unfortunately,
2