Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/253174
Title: | Efficient routing attack detection and mitigation approach for mobile adhoc networks using node statistics |
Researcher: | Saravanan S |
Guide(s): | Ramakrishnan M |
Keywords: | Engineering and Technology,Computer Science,Computer Science Information Systems mobile Adhoc networks |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | The performance of the mobile adhoc network is highly dependent newlineon the energy parameter of the mobile nodes. Firstly a trust model is newlinepresented based on the computation of different parameters to improve the newlineperformance of intrusion detection in mobile adhoc network. The trust model newlinecomputes the direct trust between different agents. Similarly the method newlinecomputes the indirect trust which is propagated by the direct trust which is newlinecomputed between third party. Finally the method computes the newlinerecommendation trust between different agents to perform intrusion detection. newlineUsing all these measures the method performs intrusion detection on the newlinemobile adhoc network.In the second approach, the behavior of the user in accessing newlinedifferent web services is analyzed. The method computes the trust on the user newlinein accessing the web service and data service. The method classifies the user newlinequery on two different level; one on the application layer and another on the newlinedatabase level. Using both of the method, the trust weight is computed to newlineperform intrusion detection.Finally to improve the performance of the routing attack detection, newlinean efficient location aware traffic approximation scheme has been designed in newlinethis research work. The method monitors the network and stores the logs newlineabout the data packet being forwarded. At each time when a node has a packet newlineit performs neighbor discovery and route discovery. Then for each route the newlinemethod compute the trust weight and each intermediate node has been newlineverified for its location factor. Based on trust weight computed the method newlineselects an efficient forwarding neighbor to send the data packet. newline newline |
Pagination: | xvi, 122p. |
URI: | http://hdl.handle.net/10603/253174 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.14 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 193.72 kB | Adobe PDF | View/Open | |
04_acknowledgment.pdf | 362.18 kB | Adobe PDF | View/Open | |
05_contents.pdf | 210.45 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 641.99 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 375.46 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 395.95 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 346.89 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 424.98 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 343.63 kB | Adobe PDF | View/Open | |
12_conclusion.pdf | 200.62 kB | Adobe PDF | View/Open | |
13_references.pdf | 347.18 kB | Adobe PDF | View/Open | |
14_publications.pdf | 406.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: