Please use this identifier to cite or link to this item:
Title: Reputation based localized on demand Routing protocol using mobile agents In mobile ad hoc networks
Researcher: Sangheethaa, S
Guide(s): Venkatesh, J
Keywords: Information and communication Engineering
Mechanisms Access control
Mobile ad hoc network
Routing protocol
Upload Date: 23-Sep-2014
University: Anna University
Completed Date: 01-05-2012
Abstract: A mobile ad hoc network is a self organizing self cooperating newlineInfrastructure less network This research focuses on managing selfish nodes in newlineMANET by access control mechanisms Access control is a mechanism of newlinedeciding which node can access the network who can use the network layer newlineservices like packet forwarding and routing The ad hoc network does not have newlineany fixed base station as in cellular networks or routers as in wired networks to newlineperform this access control mechanism All the nodes in an ad hoc network act as newlinea router and cooperate among themselves for proper functioning of the network newlineIt is assumed that all the nodes that participate in the network will do forwarding newlineand routing in favor of other nodes But this assumption does not work in all newlinecases Sometimes the nodes agree to forward but fail to do because they want to newlinesave their battery power and CPU cycles They just keep receiving the data newlinedestined for them and drop the data of other nodes without forwarding or routing newlinethem which reduces the throughput of the network newlineThe main aim of access control is to allow only the well behaving nodes to newlineaccess the network and to isolate misbehaving nodes from the network A newlinemisbehaving node can be either a selfish or a malicious node A selfish node is newlineunwilling to spend battery life CPU cycles or available network bandwidth to newlineforward packets not of direct interest to it even though it expects others to newlineforward packets on its behalf A malicious node launches a denial of service newlineattack by intentionally dropping other s packets newline newline
Pagination: xxi, 160p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File21.41 kBAdobe PDFView/Open
02_certificate.pdf1.32 MBAdobe PDFView/Open
03_abstract.pdf16.18 kBAdobe PDFView/Open
04_acknowledgement.pdf8.09 kBAdobe PDFView/Open
05_content.pdf29.16 kBAdobe PDFView/Open
06_chapter1.pdf77.17 kBAdobe PDFView/Open
07_chapter2.pdf117.66 kBAdobe PDFView/Open
08_chapter3.pdf108.3 kBAdobe PDFView/Open
09_chapter4.pdf254.98 kBAdobe PDFView/Open
10_chapter5.pdf109.02 kBAdobe PDFView/Open
11_chapter6.pdf278.64 kBAdobe PDFView/Open
12_chapter7.pdf31.34 kBAdobe PDFView/Open
13_appendix.pdf25.75 kBAdobe PDFView/Open
14_reference.pdf66.78 kBAdobe PDFView/Open
15_publication.pdf49.67 kBAdobe PDFView/Open
16_vitae.pdf6.14 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.