Please use this identifier to cite or link to this item:
Title: An Enhanced Security Mechanism Using Soft Computing Technique in Mobile Networks
Researcher: MONIKA
Guide(s): Sandeep Kumar and Vivek Kumar Sharma
Keywords: Engineering and Technology,Computer Science,Computer Science Hardware and Architecture
University: Jagannath University, Jaipur
Completed Date: 2019
Abstract: The research work is about detection of Black Hole attack between the communication taken place between the source and the destination. In this work a soft computing fuzzy based system is presented here to detect and resolve the problem of Black Hole attack. In this work each node is defined as an intelligent node that will keep the information about the neighboring nodes and perform the decision making based on statistical information of neighboring nodes As a node start has to start the communication it check the communication on each neighbor node by sending the hello message. It will check whether the neighboring nodes reply effectively or not. The basic decision taken here is on the basis of driven throughput and the response time or the delay. As the node reply it checks if the response time is greater than its estimated response time then it will again exclude that particular node from the list. There also exists some diagnostic algorithm to transfer the data with true decision making. The complete process is repeated node by node till the destination node is not achieved. newlineThe proposed study is about to detect the black hole attack in case of wireless network. This work includes the analysis of existing methodologies to detect the black hole. The work also includes the soft computing approach namely fuzzy logic to prevent the black hole attack in a wireless network. The work presented here is a route reconfiguration approach to prevent the black hole attack. The proposed work will use a fuzzy based preventive routing approach to perform a safe communication over the network. The work is simulated on NS2 under Ubuntu Environment. newlineThe mobile ad hoc network is one of most commonly used wireless network. As the number of user in this network increases it also suffer from most of the network problems like congestion, packet loss, intrusion etc. In case of multicast such kind of problem is quite common. AODV((ad hoc on demand distance vector) is the most efficient on demand protocol used in mobile ad hoc networ
Appears in Departments:Faculty of Engineering and Technology

Files in This Item:
File Description SizeFormat 
certificate.docxAttached File12.01 kBMicrosoft Word XMLView/Open
chapter 1.docx340.32 kBMicrosoft Word XMLView/Open
chapter 2.docx21.64 kBMicrosoft Word XMLView/Open
chapter 3.docx30.31 kBMicrosoft Word XMLView/Open
chapter 4.docx219.85 kBMicrosoft Word XMLView/Open
chapter 5.docx882.87 kBMicrosoft Word XMLView/Open
chapter 6.docx14.27 kBMicrosoft Word XMLView/Open
chapter 7.docx58.06 kBMicrosoft Word XMLView/Open
prelimary .docx23.89 kBMicrosoft Word XMLView/Open
publactions.docx13.1 kBMicrosoft Word XMLView/Open
references.docx40.88 kBMicrosoft Word XMLView/Open
title page.docx24.17 kBMicrosoft Word XMLView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: