Please use this identifier to cite or link to this item:
Title: Efficient routing attack detection and mitigation approach for mobile adhoc networks using node statistics
Researcher: Saravanan S
Guide(s): Ramakrishnan M
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
mobile Adhoc
University: Anna University
Completed Date: 2018
Abstract: The performance of the mobile adhoc network is highly dependent newlineon the energy parameter of the mobile nodes. Firstly a trust model is newlinepresented based on the computation of different parameters to improve the newlineperformance of intrusion detection in mobile adhoc network. The trust model newlinecomputes the direct trust between different agents. Similarly the method newlinecomputes the indirect trust which is propagated by the direct trust which is newlinecomputed between third party. Finally the method computes the newlinerecommendation trust between different agents to perform intrusion detection. newlineUsing all these measures the method performs intrusion detection on the newlinemobile adhoc network.In the second approach, the behavior of the user in accessing newlinedifferent web services is analyzed. The method computes the trust on the user newlinein accessing the web service and data service. The method classifies the user newlinequery on two different level; one on the application layer and another on the newlinedatabase level. Using both of the method, the trust weight is computed to newlineperform intrusion detection.Finally to improve the performance of the routing attack detection, newlinean efficient location aware traffic approximation scheme has been designed in newlinethis research work. The method monitors the network and stores the logs newlineabout the data packet being forwarded. At each time when a node has a packet newlineit performs neighbor discovery and route discovery. Then for each route the newlinemethod compute the trust weight and each intermediate node has been newlineverified for its location factor. Based on trust weight computed the method newlineselects an efficient forwarding neighbor to send the data packet. newline newline
Pagination: xvi, 122p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.68 kBAdobe PDFView/Open
02_certificates.pdf1.14 MBAdobe PDFView/Open
03_abstract.pdf193.72 kBAdobe PDFView/Open
04_acknowledgment.pdf362.18 kBAdobe PDFView/Open
05_contents.pdf210.45 kBAdobe PDFView/Open
06_chapter1.pdf641.99 kBAdobe PDFView/Open
07_chapter2.pdf375.46 kBAdobe PDFView/Open
08_chapter3.pdf395.95 kBAdobe PDFView/Open
09_chapter4.pdf346.89 kBAdobe PDFView/Open
10_chapter5.pdf424.98 kBAdobe PDFView/Open
11_chapter6.pdf343.63 kBAdobe PDFView/Open
12_conclusion.pdf200.62 kBAdobe PDFView/Open
13_references.pdf347.18 kBAdobe PDFView/Open
14_publications.pdf406.85 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: