Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/221596
Title: | Enhanced Security Framework for Communication and Management in Mobile Ad hoc Network |
Researcher: | Pandey Vinay Kumar |
Guide(s): | Singh Harvir |
Keywords: | Engineering and Technology |
University: | Uttarakhand Technical University |
Completed Date: | 26-2-2016 |
Abstract: | In an ad hoc wireless network distributed nodes communicate with each other over a wireless medium. Two important problems in wireless ad hoc networks are network allocation Vector Setting and routing. Network allocation Vector Setting is used for avoidance of packets and NAV frame check sequence for verifying the integrity of the frame. Routing is the process of moving messages across a network from a source to a destination. In this thesis, works extends trust based concept working on a MAC protocol which support the avoidance of packets using NAV setting in both routing and link layers of Mobile ad hoc networks. Chapter 4 shows our results and will comment on them. The basic access mechanism is carrier sense multiple access with collision avoidance CSMACA with binary exponential back off similar to IEEE 802.3with some significant exceptions. CSMA CA is a listen before talk access mechanism. newlineIt will also increment the appropriate retry counter associated with the frame. The IEEE802.11MAC uses collision avoidance rather than the collision detection of IEEE 802.3.It is also unusual for all wireless devices in LAN to be able to communicate directly with all other devices. For this reason, IEEE802.11MAC implements a network allocation vector. newlineThe NAV is a value that indicates to a station the amount of time that remains before the medium will become available. The NAV is a virtual carrier sensing mechanism with combine physical carrier sensing mechanism the MAC implements the collision avoidance portion of the CSMA CA access mechanism. The final part of this work shows how further studies like the evaluation using FSM can be performed on top of the simulation framework. We have also included some basic guidelines on how to secure the network with new ideas using finite state machine mention in thesis. newline newline |
Pagination: | 118 pages |
URI: | http://hdl.handle.net/10603/221596 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01-title page.pdf | Attached File | 23.91 kB | Adobe PDF | View/Open |
02-certificate.pdf | 132.54 kB | Adobe PDF | View/Open | |
03-table of content.pdf | 298.62 kB | Adobe PDF | View/Open | |
04-list of table.pdf | 23 kB | Adobe PDF | View/Open | |
05-list of figure.pdf | 28.94 kB | Adobe PDF | View/Open | |
06-acknowledgement.pdf | 31.85 kB | Adobe PDF | View/Open | |
07-chapter 1 .pdf | 329.67 kB | Adobe PDF | View/Open | |
08-chapter2 .pdf | 787.46 kB | Adobe PDF | View/Open | |
09-chapter3.pdf | 357.81 kB | Adobe PDF | View/Open | |
10-chapter4.pdf | 733.06 kB | Adobe PDF | View/Open | |
11-chapter 5.pdf | 104.13 kB | Adobe PDF | View/Open | |
12-references.pdf | 63.47 kB | Adobe PDF | View/Open | |
13-list of publications.pdf | 36.01 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: