Professional Documents
Culture Documents
Technical Seminar Report
Technical Seminar Report
ON
Submitted By
DEEPAK ROUT
Reg.No. : 0701227284
Section : 7ET2(A)
Department
Of
Electronics and Telecommunication Engineering
C. V. Raman College of Engineering
ACKNOWLEDGEMENT
I would also like to show my deepest regards to all the faculty members of
Electronics & Telecommunication Engineering Department for their kind advice
and constant support.
Finally I would like to thank all my friends and well-wishers for their help and
suggestions.
Deepak Rout
Regd No : 0701227284
Section : 7ET 2(A)
ABSTRACT
This paper presents a guard node based scheme to identify malicious nodes in Ad
hoc On-Demand Distance Vector (AODV) protocol. In this scheme each node
calculates trust level of its neighboring nodes for route selection. Trust calculation
process involves opinions of other nodes about the node whose trust level is to be
determined. If a neighboring node has a trust level lower than a predefined
threshold value, it is identified as malicious and it is not considered for route
selection. Simulation results show that the proposed scheme improves performance
of AODV by identifying and removing malicious nodes. Performance of the
scheme has been evaluated for four different types of malicious attacks (denial of
service attack, wormhole attack, impersonation attack, black hole attack).
CONTENTS
TITLES Pages
1. INTRODUCTION…………………………………………… 01
2. TRADITIONAL TECHNIQUE.…………………………….. 02
3. PRINCIPLE OF OPERATION……………………………… . 04
4. DESIGN PARAMETER………………………………….......... 10
6. MEASUREMENT………………………………………………. 15
7. PERFORMANCE………………………………………………. 17
9. APPLCATION………………………………………………. .. .. 20
10.FUTURE CHALLENGE……………………………………….. 21
11.CONCLUSION……………………………………………………22
12.REFERENCES……………………………………………………23
LIST OF FIGURES
Figure Pages
3. Load Modulation……………………………………………….......06
5. Principle of Backscattering..………………………………….........08
6. Field Regions………………………………………………………10
9. Measurement Setup………………………………………………...16