Attacks and countermeasures on routing protocols in wireless networks

dc.contributor.advisor Johnny S. Wong
dc.contributor.advisor Julie A. Dickerson
dc.contributor.author Velagaleti, Narasimha Rao
dc.contributor.department Department of Computer Science
dc.date 2018-08-11T15:18:39.000
dc.date.accessioned 2020-06-30T02:29:32Z
dc.date.available 2020-06-30T02:29:32Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2008
dc.date.embargo 2013-06-05
dc.date.issued 2008-01-01
dc.description.abstract <p>Routing in wireless networks is not an easy task as they are highly vulnerable to attacks. The main goal of this work is to study the routing performance and security aspects of wireless ad hoc and mesh networks. Most of the routing protocols use hop-count as the routing metric. Hop count metric may not be appropriate for routing in wireless networks as this does not account for the link qualities, advantages of multi-radio paradigm etc.</p> <p>There are several metrics designed for link quality based source routing protocols for multi-radio wireless ad hoc and mesh networks. For example Weighted Cumulative Expected Transmission Time (WCETT), Adjusted Expected Transfer Delay(AETD) etc. But these metrics do not consider the effect of individual link qualities on the total route quality and route selection. This lack of ability from WCETT or AETD would allow them to select suboptimal paths when actually an optimal path is available. In another point of view, this inability can create a routing disruption attack named as delay-variation attack (a variant of black hole attack). It can be launched by a couple of colluding attackers attracting packets at one point by showing very good link qualities and dropping packets at another point by decreasing the link quality. To select an optimal route and prevent the above mentioned attack, a new routing metric known as Variance Based Path Quality metric (VBPQ) is proposed. VBPQ metric provides a robust, reliable and secure edge to the routing mechanism.</p> <p>Another major contribution of this study is to provide a detection mechanism for wormhole attacks in wireless ad hoc networks operating on link quality based source routing protocols. There have been several detection techniques designed for hop count based routing protocols but not for link quality based source routing protocols. In this work, a data mining approach called Cross feature analysis is used in an algorithm to detect wormhole attacks.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/10586/
dc.identifier.articleid 1610
dc.identifier.contextkey 2806777
dc.identifier.doi https://doi.org/10.31274/etd-180810-293
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/10586
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/24792
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/10586/Velagaleti_iastate_0097M_10016.pdf|||Fri Jan 14 18:23:49 UTC 2022
dc.subject.disciplines Computer Sciences
dc.subject.keywords routing
dc.subject.keywords security
dc.subject.keywords attacks
dc.subject.keywords VBPQ
dc.subject.keywords wireless mesh networks
dc.subject.keywords wireless networks
dc.subject.keywords wormhole attack
dc.title Attacks and countermeasures on routing protocols in wireless networks
dc.type thesis en_US
dc.type.genre thesis en_US
dspace.entity.type Publication
relation.isOrgUnitOfPublication f7be4eb9-d1d0-4081-859b-b15cee251456
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Velagaleti_iastate_0097M_10016.pdf
Size:
923.82 KB
Format:
Adobe Portable Document Format
Description: