Please use this identifier to cite or link to this item:
Title: Reliable mitigation techniques for handling malicious adversaries in mobile ad hoc network
Researcher: Saravanan R
Guide(s): Ilavarasan E
University: Manonmaniam Sundaranar University
Completed Date: 2018
Abstract: Trust between the mobile nodes of the ad hoc network is essential for newlineensuring reliable data dissemination as they lack a centralized point of control for newlineguiding the nodes under mobility. This trust of mobile nodes is influenced by the newlineenergy and cooperation degree rendered by each mobile node for the sake of the newlineothers. Further, malicious adversaries intentionally or non-intentionally influence newlinethe energy and cooperation of the mobile nodes that leads to catastrophic impacts newlineon the performance of the network. Thus, malicious adversaries need to be newlinedetected and isolated from the network for maintaining the packet delivery rate in newlinethe network. The majority of the existing works in the literature uses path rater newlineand the watchdog for malicious adversary detection. But, the use of path rate and newlinewatchdog mechanism incurs high communication overhead and delay during its newlineimplementation process. Trust-based techniques that depends on statistical trust newlinefactors and random pseudonym are proved to be potential in addressing the newlinedetection of malicious adversaries. newlineIn this research work, four significant malicious adversaries detection newlineschemes such as Threshold Packet Forwarding Potential Parameter-based newlineDetection Mechanism (TPFPPDM), Gwet Kappa-based Repeated Node newlineTaxonomy Scheme(GKRNTS), Link Stability Inspired Hopping Technique newline(LSIHT) and Pseudonym-Based Improved Cryptographic Technique (PBICT) are newlineproposed. The proposed malicious adversary detection schemes are compared and newlineinvestigated for determining the optimal scheme among the contributed detection newlinetechniques of this research work. Initially, TPFPPDM approach was proposed for newlineeffectively detecting malevolent nodes based on the computation of normalized newlinethreshold parameter for improving the Quality of Service (QoS) in MANET. newline
Pagination: xiii, 143p.
Appears in Departments:Department of Computer Science & Engg.

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File28.9 kBAdobe PDFView/Open
02_certificate.pdf19.68 kBAdobe PDFView/Open
03_acknowledgement.pdf15.74 kBAdobe PDFView/Open
04_content.pdf33.41 kBAdobe PDFView/Open
05_list of tables.pdf32.25 kBAdobe PDFView/Open
06_abbrevation.pdf20.75 kBAdobe PDFView/Open
08_chapter1..pdf143.73 kBAdobe PDFView/Open
09_chapter2.pdf121.09 kBAdobe PDFView/Open
10_chapter3.pdf466.51 kBAdobe PDFView/Open
11_chapter4.pdf513.38 kBAdobe PDFView/Open
12_chapter5.pdf534.79 kBAdobe PDFView/Open
13_chapter6.pdf593.35 kBAdobe PDFView/Open
14_chapter7.pdf44.08 kBAdobe PDFView/Open
15_references.pdf72.47 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: