Spring 2023
ENSC 894 G300 SPECIAL TOPICS II: COMMUNICATION NETWORKS

FINAL PROJECTS:

  • 1. Aiman Sania (Aiman) Meenai, Divya Lakshmi (Rajeev, Divya) Rajeev Kumar
        (ams24 at sfu.ca, dlr5 at sfu.ca)

    Simulation and Analysis of Denial of Service Attacks on LORAWAN Network

    Abstract:
    LoRaWAN is a link layer protocol which stands for Long Range (Low Power) Wide Area Network. It is the leading LPWAN protocol currently in use for various IoT applications. In our project we analyze the vulnerabilities of LoRaWAN protocol against the following 3 denial-ofservice attacks: 1) replay attack to target individual IoT enddevices 2) exploiting beaconing vulnerability 3) exploiting downlink routing vulnerability. As a result, we aim to track and analyze channel throughput, LoRa metadata parameters like Signal to Noise Ratio, Coding Rate and Received Signal Strength Indication under attack.

    References:
    1. Performance analysis of Wi-Fi Direct for vehicular ad-hoc networks Balasundram A, Samarasinghe T, Dias D. Performance analysis of Wi-Fi Direct for vehicular ad-hoc networks. In2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) 2016 Nov 6 (pp. 1-6). IEEE.
    2. Simulation of VANET Using NS-3 and SUMO Raj C, Upadhayaya U, Makwana T, Mahida P. Simulation of VANET using ns-3 and SUMO. International Journal of Advanced Research in Computer Science and Software Engineering. 2014 Apr;4(4).
    3. Coordinative simulation with SUMO and NS3 for Vehicular Ad Hoc Networks Weiwei Liu; Xichen Wang; Wenli Zhang; Lin Yang; Chao Peng “Coordinative simulation with SUMO and NS3 for Vehicular Ad Hoc Networks„, Publisher: IEEE, Published in: 2016 22nd Asia-Pacific Conference on Communications (APCC), DOI: 10.1109/APCC.2016.7581471
    4. Vehicular Cloud Traffic Infrastructure Generation Using SUMO Amar AK, Kumar S. Vehicular Cloud Traffic Infrastructure Generation Using SUMO. International Journal of Innovative Research in Computer and Communication Engineering. 2016;4(1):385-93.
    5. Studying Routing Issues in Vanets Using Ns-3 and SUMO Abdellatif MM, Aly O. Studying Routing Issues in Vanets Using Ns-3 and SUMO. Journal of Communications. 2022 Sep;17(9).


  • 2. Limon Motin and Niger Sultana
        (lma110 at sfu.ca, niger_sultana at sfu.ca)

    Performance comparison of MANET routing protocols

    Abstract:
    MANET stands for Mobile Ad-Hoc Network, which forms a temporary network without the assistance of centralized administration. It consists of a group of wireless portable hosts. The ability of joining or leaving any network anytime is the key feature of MANET. The performance quality of MANET can be measured based on various parameters including packet delivery ratio, routing overhead, average end-to-end delay, jitter and packet loss and so on. Network circumstances also can impact the performance. There are different routing protocols for MANET. Ad hoc On-Demand Distance Vector Routing, Destination-Sequenced Distance Vector Routing, Dynamic Source Routing, and Optimized Link State Routing. In this project, we aim to compare different routing protocols of MANET and the performances (AODV, DSDV, OLSR and DSR). Our main objective is to figure out which routing protocol has the best overall performance.

    References:
    1. G. Kaur and P. Thakur, "Routing Protocols in MANET: An Overview," 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 2019, pp. 935-941, doi: 10.1109/ICICICT46008.2019.8993294. click here to visit
    2. T. Sapna, K. Deshpande and K. Ravi, "Study On Routing Protocols For MANETs," 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), Belgaum, India, 2018, pp. 322-325, doi: 10.1109/CTEMS.2018.8769137. click here to visit
    3. M. N. Alslaim, H. A. Alaqel and S. S. Zaghloul, "A comparative study of MANET routing protocols," The Third International Conference on e-Technologies and Networks for Development (ICeND2014), Beirut, Lebanon, 2014, pp. 178-182, doi: 10.1109/ICeND.2014.6991375. click here to visit
    4. Neelu Kumari, Sandeep Kumar Gupta, Rajni Choudhary, Shubh Laxshmi Agrwal, “New Performance Analysis of AODV, DSDV and OLSR Routing Protocols for MANET”, 2016 International Conference on computing for Sustainable Global Development (INDIACom), 978-9-3805-4421- 2/16/$31.00©2016 IEEE click here to visit
    5. S. Tamilarasan. “A comparative study of multi-hop wireless ad-hoc network routing protocols in MANET,” International Journal of Computer Science Issues (IJCSI), 8(5), pp. 176—184, 2011. click here to visit


  • 3. Nwagwu, Johnpaul Kosisochukwu (Johnpaul)
        (jkn14 at sfu.ca)

    Performance Analysis of AODV MANET under Black Hole Attack

    Abstract:
    A mobile Ad hoc Network (MANET) is a group of independent mobile nodes that spontaneously creates a radio network without using any preexisting infrastructure. This type of network is vulnerable to a variety of network layer assaults because of its changing topology and lack of centralized Administration. One such network attack is the black hole attack. In this project, the performance of MANETS under the Ad hoc on Demand Distance Vector Protocol (AODV) is simulated and analyzed with and without a black hole attack and performance metrics such as throughput, and delay is computed and compared. The simulation is done using NS-3 and we also discuss possible ways to mitigate such attacks.

    References:
    [1] Avula, K. P. (2012). Performance Evaluation of mobile adhoc network under black hole attack. International Conference on Software Engineering and Mobile Application Modelling and Development(ICSEMA 2012), pp. 1-6. doi:10.1049/ic.2012.0155
    [2] Jain, S., & Khuteta, A. (2015). Detecting and overcoming blackhole attack in Mobile Adhoc Network. International Conference on Green Computing and Internet of Things(ICGCIOT), pp. 225-229. doi:10.1109/ICGCIoT.2015.7380462
    [3] Khokhar, R., Satria, M., & Ngadi, M. (2008). A Review of Current Routing Attacks in Mobile Adhoc Networks. International Journal of Computer Science and Security 2.3.
    [4] Panda, P., gadnayak, K., & Panda, N. (2013). MANET Attacks and their Counter-measures: A Survey. International Journal of Computer Science and Mobile Computing 2.11, pp. 319-330.
    [5] Sbai, O., & Elboukhari, M. (2018). Simulation of MANET's Single and Multiple Blackhole Attack with NS-3. 2018 IEEE 5th International congress on Information Science and Technology (CiSt), pp. 612-617. doi:10.1109/CIST.2018.8596606


    Last modified: Sat 25 Mar 2023 13:44:45 PDT.