Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5388
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ranjan, Prabhat | - |
dc.contributor.author | Saini, Hemraj [Guided by] | - |
dc.date.accessioned | 2022-07-30T10:21:39Z | - |
dc.date.available | 2022-07-30T10:21:39Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5388 | - |
dc.description.abstract | Wireless Mesh Networks (WMN) is one of the promising technology in providing wireless internet connectivity.It contains clients and routers,where mesh routers have minimal mobility and form the backbone of WMN.They give access to network for previous clients as well as mesh.Mesh clients can be either stationary or mobile and can form a client mesh network among themselves and with mesh routers. WMN’s are anticipated to resolve the limitations and to significantly improve the performance of other networks. Since it allows faster, easy and cheaper network deployment they are becoming a popular choice. WMN applications are in broadband home networking, community etc. Security is the important aspect in WMN. Due to its open medium, dynamic topology and lack of physical security they are vulnerable to various kinds of attacks and intrusions at different layers. Security in WMN is still its infancy as very little attention has been devoted so far and so it has become vulnerable to various types of attacks. Various DoS attacks have been described.DoS attacks can compromise the availability of wireless mesh networks as it would hinder nodes from accessing or providing specific services. Gray hole is one kind of routing disturbing attacks and can bring great damage to the network.Intrusion is something which is unwanted work hindering the functions of wireless network.Wireless network is very much prey to many threats at OSI layers due to mainly cooperation among their noses Intrusion detection is a passive defense strategy to inform administrator about attacks on the network. Cross layer IDS, to accommodate the combined characterstics of link with routing information in wireless mesh networks to detect attacks on multiple layers.We choose DSR protocol to test the algorithm by ns-2 as simulation tool. Using cross layer mechanism on Dynamic Source Routing (DSR) protocol we can detect Gray hole attack in the network. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Wireless networks | en_US |
dc.subject | Wireless mesh networks | en_US |
dc.subject | Dynamic source routing | en_US |
dc.subject | Denial of service | en_US |
dc.title | Cross-layer Ids for Grayhole Attack in Wireless Mesh Network | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | Dissertations (M.Tech.) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cross-layer Ids for Grayhole Attack in Wireless Mesh Network.pdf | 1.68 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.