Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5901
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rana, Sakshi | - |
dc.contributor.author | Saini, Hemraj [Guided by] | - |
dc.date.accessioned | 2022-08-21T04:35:38Z | - |
dc.date.available | 2022-08-21T04:35:38Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5901 | - |
dc.description.abstract | With the advent of various types of wireless networks in the next generation to provide users with better services and faster technology, wireless mesh networks have been gaining immense popularity. With their unique architectural features and fast connectivity wireless mesh networks promise to extend performance beyond what is obtained with the current WI-FI based infrastructure. Wireless mesh networks not only provide users with unmatched connectivity and performance but also has features like dynamically self-organized and self-configuring. This feature brings many advantages to WMNs such as low-upfront cost, easy network maintenance, robustness and reliable service coverage. Despite all the benefits, wireless mesh networks are highly susceptible to internal as well as external attacks due to the open nature of the wireless medium. Although external attacks can be mitigated using a combination of cryptography based and robust communication techniques, the internal attacks, which exploit the knowledge of the network secrets and protocol semantics, are difficult to detect and require protocols with built-in security measures. Through this project I try to address the problem of Jamming attacks in wireless mesh networks. In these type of attacks the attacker takes advantage of the network secrets and then classifies the packets which are of high importance .To perform Selective jamming, the attacker must be capable of classifying the transmitted packets and corrupting them before the end of their transmission. Through this project I try to detect the various kinds of security threats that hinder the performance of wireless mesh networks. Also, try to formulate new strategies and also improve existing ones to mitigate these attacks on WMNs. Furthermore I am interested in identifying the loopholes of the existing strategies to make them more robust and make them efficient to detect and mitigate attacks more effectively. Hence, to provide a reliable communication network. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Wireless mesh networks | en_US |
dc.subject | Mobile adhoc networks | en_US |
dc.subject | Network architecture | en_US |
dc.subject | Denial of service | en_US |
dc.title | Detecting Attacks in Wireless Mesh Networks | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Detecting Attacks in Wireless Mesh Networks.pdf | 1.03 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.