Professional Documents
Culture Documents
Proposal2
Proposal2
Thesis supervisor:
April /2021
Contents
- Introduction.
- Problem Statement.
- Objective of Research.
- Methodology.
- Scope Of Research
- Thesis Time Schedule
- References
Introduction
Ad hoc networks are a networking platform which works wirelessly. In contrast to conventional wireless networks,
such networks are not dependent on any fixed infrastructure, Comparatively, they rely on each other to stay
connected in a network
In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one
mobile node to another mobile node. Thus, a routing protocol is needed which encapsulates the essential system of
mechanized security whose function incorporates preventing, detecting as well as responding to the security
attacks .
in mobile Ad hoc networks, routing protocols are vulnerable to various kinds of security attacks such as black hole
node attacks and flooding attack.
black hole node attacks
• So, to protect a MANET, nodes are set up in a network which transfer the message and helps in direct
2 communication
• routing protocol is used to encapsulate the mechanized security system to prevent security attacks. These security
attacks are always probable and work as a barrier in the proper functioning and operation of a mobile ad hoc
3 network. If these security attacks are not handled properly on time, they can cause great damage to the project in
terms of time, quality, budget, cost, communication and so on.
• To prove the extent of the impact of any of the attacks on the network we have applied a simulation of the black
4 hole and flooding attack by using network simulation by NS2 software and analyzed the results .
1- inspect the security threats that are probable in the mobile ad
hoc networks.
0bjective of Research
3- study how these threats can cause main disturbance in the
operations as MANET.
Research approach Prevent the Ad-hoc from security attack (black hole & flooding)
Duration (weeks)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Topic Selection
Proposal Write up
Introductory Chapter
Literature Review
Methodology
Results& Interpretation
Findings, Conclusion,
Recommendation
References
1. Jawandhiya, P. M., Ghonge, M. M., Ali, M. S., & Deshpande, J. S. (2010). A survey of mobile ad hoc network
attacks. International Journal of Engineering Science and Technology, 2(9), 4063-4071.
2. Purkayastha, B. S., & Das, R. (2012). Comparative Analysis of Routing Attacks in Ad Hoc Network. International
Journal of Advanced Networking and Applications, 3(5), 1352.
3. Ramanathan, R., & Redi, J. (2002). A brief overview of ad hoc networks: challenges and directions. IEEE
communications Magazine, 40(5), 20-22.
4. Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE network, 13(6), 24-30.
5. M. Karthigha, L. Latha, and K. Sripriyan, “A Comprehensive Survey of Routing Attacks in Wireless Mobile Ad
hoc Networks,” Proc. 5th Int. Conf. Inven. Comput. Technol. ICICT 2020, pp. 396–402, 2020.
6. S. Kumar, M. Goyal, D. Goyal, and R. C. Poonia, “Routing Protocols and Security Issues in MANET,” 2017.
7. R. Meddeb, B. Triki, F. Jemili, and O. Korbaa, “A survey of attacks in mobile ad hoc networks,” Proc. - 2017 Int.
Conf. Eng. MIS, ICEMIS 2017, vol. 2018-January, pp. 1–7, 2018.
8. C. Science and P. I. G. G. C. W. J. Haryana, “A Literature Survey of MANET Parul Gupta Topology based
Protocols,” pp. 95–99, 2016.
Thank you