Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/231016
Title: | Reliable mitigation techniques for handling malicious adversaries in mobile ad hoc network |
Researcher: | Saravanan R |
Guide(s): | Ilavarasan E |
University: | Manonmaniam Sundaranar University |
Completed Date: | 2018 |
Abstract: | Trust between the mobile nodes of the ad hoc network is essential for newlineensuring reliable data dissemination as they lack a centralized point of control for newlineguiding the nodes under mobility. This trust of mobile nodes is influenced by the newlineenergy and cooperation degree rendered by each mobile node for the sake of the newlineothers. Further, malicious adversaries intentionally or non-intentionally influence newlinethe energy and cooperation of the mobile nodes that leads to catastrophic impacts newlineon the performance of the network. Thus, malicious adversaries need to be newlinedetected and isolated from the network for maintaining the packet delivery rate in newlinethe network. The majority of the existing works in the literature uses path rater newlineand the watchdog for malicious adversary detection. But, the use of path rate and newlinewatchdog mechanism incurs high communication overhead and delay during its newlineimplementation process. Trust-based techniques that depends on statistical trust newlinefactors and random pseudonym are proved to be potential in addressing the newlinedetection of malicious adversaries. newlineIn this research work, four significant malicious adversaries detection newlineschemes such as Threshold Packet Forwarding Potential Parameter-based newlineDetection Mechanism (TPFPPDM), Gwet Kappa-based Repeated Node newlineTaxonomy Scheme(GKRNTS), Link Stability Inspired Hopping Technique newline(LSIHT) and Pseudonym-Based Improved Cryptographic Technique (PBICT) are newlineproposed. The proposed malicious adversary detection schemes are compared and newlineinvestigated for determining the optimal scheme among the contributed detection newlinetechniques of this research work. Initially, TPFPPDM approach was proposed for newlineeffectively detecting malevolent nodes based on the computation of normalized newlinethreshold parameter for improving the Quality of Service (QoS) in MANET. newline |
Pagination: | xiii, 143p. |
URI: | http://hdl.handle.net/10603/231016 |
Appears in Departments: | Department of Computer Science & Engg. |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 28.9 kB | Adobe PDF | View/Open |
02_certificate.pdf | 19.68 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 15.74 kB | Adobe PDF | View/Open | |
04_content.pdf | 33.41 kB | Adobe PDF | View/Open | |
05_list of tables.pdf | 32.25 kB | Adobe PDF | View/Open | |
06_abbrevation.pdf | 20.75 kB | Adobe PDF | View/Open | |
08_chapter1..pdf | 143.73 kB | Adobe PDF | View/Open | |
09_chapter2.pdf | 121.09 kB | Adobe PDF | View/Open | |
10_chapter3.pdf | 466.51 kB | Adobe PDF | View/Open | |
11_chapter4.pdf | 513.38 kB | Adobe PDF | View/Open | |
12_chapter5.pdf | 534.79 kB | Adobe PDF | View/Open | |
13_chapter6.pdf | 593.35 kB | Adobe PDF | View/Open | |
14_chapter7.pdf | 44.08 kB | Adobe PDF | View/Open | |
15_references.pdf | 72.47 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: