Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/254383
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Design and Performance Evaluation of Secured Authentication Routing In Mobile Adhoc Networks | |
dc.date.accessioned | 2019-08-22T11:57:43Z | - |
dc.date.available | 2019-08-22T11:57:43Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/254383 | - |
dc.description.abstract | newline Wireless communication has become inevitable and act as part of human life in the past two decades. The improved technology and reduced cost gained more importance towards wireless networks than wired networks in the recent years. The scalability and the mobility of the wireless devices made it possible in many real time applications. The adhoc network is a one such wireless network that can establish a reliable communication where communication is not possible. Mobile Adhoc Network (MANET) is a type of adhoc network that is formed by the collection of mobile nodes equipped with a transceiver and communicate through duplex links. Each node in MANET acts as a router and discover the route to the destination from the source through intermediate nodes. MANET possess several characteristics like dynamic topology, speed of deployment, energy constrained operation, variable capacity and bandwidth. The dynamic nature of MANET is more prone to security threats. There are several security solutions provided by the researchers in the recent years through intrusion detection, routing, security protocols and other mechanisms. Even though several solutions available, they are not sufficient to protect the network nodes. The performance of the network degrades when the number of nodes increases under the malicious environment. | |
dc.format.extent | xviii,132p. | |
dc.language | English | |
dc.relation | p.121-131 | |
dc.rights | university | |
dc.title | Design and performance evaluation of secured authentication routing in mobile adhoc networks | |
dc.title.alternative | ||
dc.creator.researcher | Raja L | |
dc.subject.keyword | Dual Hash Authentication | |
dc.subject.keyword | Engineering and Technology,Computer Science,Computer Science Information Systems | |
dc.subject.keyword | Mobile Adhoc Network | |
dc.subject.keyword | Optimized Routing Technique | |
dc.subject.keyword | Routing | |
dc.subject.keyword | Secured Authentication Routing | |
dc.description.note | ||
dc.contributor.guide | Periasamy PS | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | n.d. | |
dc.date.completed | 2018 | |
dc.date.awarded | 30/09/2018 | |
dc.format.dimensions | 21cm. | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.39 kB | Adobe PDF | View/Open |
02_certificates.pdf | 444.58 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 9.87 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 182.16 kB | Adobe PDF | View/Open | |
05_contents.pdf | 185.1 kB | Adobe PDF | View/Open | |
06_list_of_symbols_and_abbreviations.pdf | 793.97 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 497.5 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 165.11 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 298.07 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 1.02 MB | Adobe PDF | View/Open | |
11_chapter5.pdf | 236.9 kB | Adobe PDF | View/Open | |
12_chapter6.pdf | 18.77 kB | Adobe PDF | View/Open | |
13_references.pdf | 103.74 kB | Adobe PDF | View/Open | |
14_publications.pdf | 62.12 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: