Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/221596
Title: Enhanced Security Framework for Communication and Management in Mobile Ad hoc Network
Researcher: Pandey Vinay Kumar
Guide(s): Singh Harvir
Keywords: Engineering and Technology
University: Uttarakhand Technical University
Completed Date: 26-2-2016
Abstract: In an ad hoc wireless network distributed nodes communicate with each other over a wireless medium. Two important problems in wireless ad hoc networks are network allocation Vector Setting and routing. Network allocation Vector Setting is used for avoidance of packets and NAV frame check sequence for verifying the integrity of the frame. Routing is the process of moving messages across a network from a source to a destination. In this thesis, works extends trust based concept working on a MAC protocol which support the avoidance of packets using NAV setting in both routing and link layers of Mobile ad hoc networks. Chapter 4 shows our results and will comment on them. The basic access mechanism is carrier sense multiple access with collision avoidance CSMACA with binary exponential back off similar to IEEE 802.3with some significant exceptions. CSMA CA is a listen before talk access mechanism. newlineIt will also increment the appropriate retry counter associated with the frame. The IEEE802.11MAC uses collision avoidance rather than the collision detection of IEEE 802.3.It is also unusual for all wireless devices in LAN to be able to communicate directly with all other devices. For this reason, IEEE802.11MAC implements a network allocation vector. newlineThe NAV is a value that indicates to a station the amount of time that remains before the medium will become available. The NAV is a virtual carrier sensing mechanism with combine physical carrier sensing mechanism the MAC implements the collision avoidance portion of the CSMA CA access mechanism. The final part of this work shows how further studies like the evaluation using FSM can be performed on top of the simulation framework. We have also included some basic guidelines on how to secure the network with new ideas using finite state machine mention in thesis. newline newline
Pagination: 118 pages
URI: http://hdl.handle.net/10603/221596
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01-title page.pdfAttached File23.91 kBAdobe PDFView/Open
02-certificate.pdf132.54 kBAdobe PDFView/Open
03-table of content.pdf298.62 kBAdobe PDFView/Open
04-list of table.pdf23 kBAdobe PDFView/Open
05-list of figure.pdf28.94 kBAdobe PDFView/Open
06-acknowledgement.pdf31.85 kBAdobe PDFView/Open
07-chapter 1 .pdf329.67 kBAdobe PDFView/Open
08-chapter2 .pdf787.46 kBAdobe PDFView/Open
09-chapter3.pdf357.81 kBAdobe PDFView/Open
10-chapter4.pdf733.06 kBAdobe PDFView/Open
11-chapter 5.pdf104.13 kBAdobe PDFView/Open
12-references.pdf63.47 kBAdobe PDFView/Open
13-list of publications.pdf36.01 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: