Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/22978
Title: | Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks |
Researcher: | Kalpana R |
Guide(s): | Rengarajan R |
Keywords: | Ad Hoc Networks anonymity mechanisms encryption authentication MACT malicious attackers Optimized Trust Model protocol Secure Anonymous Routing |
Upload Date: | 20-Aug-2014 |
University: | Anna University |
Completed Date: | n.d. |
Abstract: | Security in ad hoc routing protocol is incorporated using encryption newlineauthentication anonymity and trust factors Though encryption and newlineauthentication provides endtoend security mechanisms of data information newlineregarding the nature and location of the nodes can be found by studying newlinetraffic pattern and routing data This security problem of ad hoc network is newlineaddressed by the use of anonymity mechanisms and trust levels in this newlineresearch Identification information like traffic flow network topology paths newlinefrom malicious attackers is hidden in anonymous networks Similarly trust newlineplays a very important role for intermediate node selection in ad hoc newlinenetworks Trust is essential as selfish and malicious nodes not only pose a newlinesecurity issue but also decreases the Quality of Service In this research a newlinerouting is proposed to address anonymous routing with trust which improves newlinethe overall security of the ad hoc network A new approach for an on demand newlineadhoc routing algorithm which is based on swarm intelligence is proposed newlineThe proposed research area investigates the performance of Ad hoc newlineOndemand Distance Vector AODV routing protocol and study the effect of newlineselfish and malicious nodes Analyse the performance degradation in an anonymous newlinead hoc network with selfish nodes under different applications newline Propose a novel routing protocol Mobile Anonymous newlineContinuous Trust MACT to address anonymity and newlinetrust for a wireless network containing selfish and newlinemalicious nodesOptimize the proposed routing protocol using Ant colony newlineOptimization Propose a hybrid optimization based on Memetic newlinealgorithm and Ant colony optimization for the proposed newlineroutingThe investigations showed that the performance of AODV routing newlineprotocol and study the effect of selfish and malicious nodes The performance newlinedegradation in an anonymous ad hoc network with selfish nodes under newlineconstant bit rate was analyzed Simulation was conducted for varying network newlinesize and with varying maliciousness newline newline |
Pagination: | xvi,173p |
URI: | http://hdl.handle.net/10603/22978 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 111.22 kB | Adobe PDF | View/Open |
02_certificate.pdf | 4.43 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 62.73 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 59.44 kB | Adobe PDF | View/Open | |
05_contents.pdf | 117.81 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 254.88 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 383.64 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 1 MB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 1.43 MB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 348.11 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 1.35 MB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 66.16 kB | Adobe PDF | View/Open | |
13_appendix.pdf | 455.66 kB | Adobe PDF | View/Open | |
14_references.pdf | 235.97 kB | Adobe PDF | View/Open | |
15_publications.pdf | 62.17 kB | Adobe PDF | View/Open | |
16_vitae.pdf | 47.47 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: