Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/206422
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialComputer Engineering
dc.date.accessioned2018-06-26T05:07:57Z-
dc.date.available2018-06-26T05:07:57Z-
dc.identifier.urihttp://hdl.handle.net/10603/206422-
dc.description.abstractquotMANET help us in setting up a network of mobile nodes like laptop, smart phones, tablet etc. without the need of any infrastructure setup. The topology of the network may change frequently due to node movement. Nodes are resource constrained and uses wireless media for communication. Each node has to act as a router to forward data of other nodes. Due to these characteristics, the routing is vulnerable to many security attacks like data loss, delay etc. Apart from these attacks, the MANET is vulnerable to low quality of service, wrong advertisement and malicious activities due to its open nature which are difficult to control and detect. To detect attacker nodes researchers have come up with cryptography based solutions. In a MANET, behaviour of a node changes due to malicious behaviour of the nodes/hardware failure/mobility of the node. The cryptographic approaches cannot detect such continuously changing behaviour of nodes. Researchers come up with a trust based routing solutions which use communication parameters for calculating trust value of a node and aggregate them to calculate trust value. They create a route based on trust of nodes and give one trustworthy route with most trusted nodes. This may add extra burden to trustworthy nodes and free other nodes from routing. To address this we can think of searching multiple trusted route between same source to destination during route formation. This allows us to use other available routes, if any route fails and the load of routing is divided among multiple nodes. In our routing scheme TMA-AODV (Trust based Mobility Aware AODV), we have used a number of packets dropped, the number of packets delayed and number of time node move out of the active route due to its movement for trust computation. The first two parameters detect the packet drop and packet delay attack and the latter parameter provides a stable route. For the implementation, we used the OPNET simulator. We have implemented drop attack and delay attacks to study its effect on route discovery time
dc.format.extentxxv, 159p.
dc.languageEnglish
dc.relationNo. of references 89
dc.rightsuniversity
dc.titleReliable routing protocol for mobile adhoc network
dc.title.alternative
dc.creator.researcherKajal Shambhubhai Patel
dc.subject.keywordMANET, Routing, Trust, attacks, selfish node, trust table, secure routing
dc.description.noteReferences p. 151-154, Appendix_A p. 155-158, Appendix_B p. 159
dc.contributor.guideJ S Shah
dc.publisher.placeAhmedabad
dc.publisher.universityGujarat Technological University
dc.publisher.institutionComputer/IT Engineering
dc.date.registered10-06-2013
dc.date.completed02-01-2018
dc.date.awarded
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Computer/IT Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File103.41 kBAdobe PDFView/Open
02_certificates.pdf143.73 kBAdobe PDFView/Open
03_abstract.pdf66.76 kBAdobe PDFView/Open
04_declaration.pdf78.02 kBAdobe PDFView/Open
05_acknowledgement.pdf62.63 kBAdobe PDFView/Open
06_contents.pdf114.64 kBAdobe PDFView/Open
07_list_of_tables.pdf68.69 kBAdobe PDFView/Open
08_list_of_figures.pdf86.97 kBAdobe PDFView/Open
09_abbreviation.pdf78.49 kBAdobe PDFView/Open
10_chapter1.pdf283.55 kBAdobe PDFView/Open
11_chapter2.pdf243.13 kBAdobe PDFView/Open
12_chapter3.pdf370.6 kBAdobe PDFView/Open
13_chapter4.pdf423.75 kBAdobe PDFView/Open
14_chapter5.pdf542.78 kBAdobe PDFView/Open
15_chapter6.pdf940.41 kBAdobe PDFView/Open
16_chapter7.pdf800.58 kBAdobe PDFView/Open
17_chapter8.pdf232.04 kBAdobe PDFView/Open
18_references.pdf99.81 kBAdobe PDFView/Open
19_appendix_a.pdf71.84 kBAdobe PDFView/Open
thesis_kajal_patel_129990907006.pdf2.22 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: