Please use this identifier to cite or link to this item:
Title: Studies on multiple attacks and secure routing for mobile ad HOC networks
Researcher: Edna elizabeth N
Guide(s): Radha S
Keywords: Electrical engineering
Mobile Ad HOC networks
Secure routing
Upload Date: 24-Feb-2014
University: Anna University
Completed Date: 01/10/2013
Abstract: A mobile ad hoc network (MANET) is a type of ad hoc network newlinethat can change locations and configure itself on the fly. Since MANETS are newlinemobile, they use wireless connections to connect to various networks. quotAd newlineHocquot is actually a Latin phrase that means for this purpose . It is often used newlineto describe solutions that are developed on-the-fly for a specific purpose. The newlineMANET, which is an ad hoc network, is an infrastructure-less, mobile, newlinemultihop, ubiquitous, and dynamic topology network. Due to these newlinecharacteristics of MANETs and their open medium and distributed newlinecooperation, ad hoc networks are more vulnerable to many types of security newlineattacks. Hence, security becomes an important issue in wireless networks. The unique characteristics of MANET combined with security newlineissues has become the primary concern for researchers to meet challenges, newlinesuch as confidentiality, authentication, integrity, availability, access control newlineand non-repudiation. The main objective of this thesis is to propose new newlinetechniques to improve the routing mechanism, by detecting and eliminating newlinevarious routing attacks, and determine the performance metrics, such as newlinepacket delivery ratio, throughput, end-to-end delay, control overhead etc. The newlinesimulation result shows that the proposed scheme is more resilient than the newlineexisting schemes. The thesis focuses on two aspects. Initially, different types newlineof attacks are handled by devising a node transition based routing algorithm that can overcome all possible threats in MANETs, and can also maximize the newlinebandwidth utilization at high traffic costing a lesser overhead. The need for newlinerouting algorithm that consumes less overhead, and at the same time, is secure newlineagainst all possible threats, especially at higher traffics, is the main motivation newlinebehind devising such routing algorithm. Secondly, new routing attacks are newlinestudied, and implemented, and a new algorithm is proposed for overcoming newlinesuch attacks, using the Ad hoc On-demand Distance Vector protocol and the newlineDynamic Source Routing protocol.
Pagination: xxviii, 164p.
Appears in Departments:Faculty of Electrical and Electronics Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File39.14 kBAdobe PDFView/Open
02_certificate.pdf241.66 kBAdobe PDFView/Open
03_abstract.pdf13.56 kBAdobe PDFView/Open
04_acknowledgements.pdf7.19 kBAdobe PDFView/Open
05_contents.pdf32.21 kBAdobe PDFView/Open
06_chapter1.pdf165.28 kBAdobe PDFView/Open
07_chapter2.pdf451.8 kBAdobe PDFView/Open
08_chapter3.pdf561.19 kBAdobe PDFView/Open
09_chapter4.pdf366.83 kBAdobe PDFView/Open
10_chapter5.pdf13.17 kBAdobe PDFView/Open
11_references.pdf30.84 kBAdobe PDFView/Open
12_publications.pdf11.77 kBAdobe PDFView/Open
13_vitae.pdf5.98 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.