Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/256617
Title: | A Novel Next Generation Encryption as a Water Mark in Achieving Authentication Security for Mobile Ad Hoc Network |
Researcher: | Charles Arockiaraj M. |
Guide(s): | P. Mayilvahanan |
University: | Vels University |
Completed Date: | |
Abstract: | Presently a day, Security is greatest worry for each kind of associations and newlineindividuals. It is furthermore leading topic in the Mobile ad hoc network (MANET) newlineparticularly as for size including intricacy of the system. MANET is a self-governing mobile newlinenodes system associated through wireless links. Every node functions like an end system, newlineadditionally being a router for the onward packets. All nodes are permitted to travel and newlinecompose themselves into a system and these nodes vary position habitually. A MANET has newlinebeen deliberated as a sort of ad hoc system which changes areas and positions their own on newlinethe hover. MANETS are portable (mobile), so they utilize connection of wireless to interface newlinewith different networks. There is an absenteeism of approved firewall in MANET. The result newlineof this MANET was the objective for a few security assaults. MANET shows various attacks newlinebe contingent on the security threads. Each network protocol s layer stack influenced since newlineabundant attacks natures. newlineThis revision recommends several hybrid algorithms to notice and reduce these kinds newlineof threads. Ad-Hoc networks need very particular security methods. Certain attacks in newlineparticular black hole and worm hole attack and couple of different DoS attacks are diminished newlinecontingent on the hybrid systems proposed in this review. The secure authentication protocol newlineand the hybrid methodology are planned centered on ECKCDSA SHA512 function of hash to newlinerecuperate the misbehavior nodes findings using the attacker increasing the safekeeping of the newlinearrangement. The protocols are scrutinized beneath the strongest attack model enduring the newlinestep process defining the network refuge within the DOS assault model. newline21 newlineLastly, the routine parameters are included by the prediction of accurateness and its newlinemischief nodes, besides proposed system s verification protocol under dissimilar perspectives newlinewith signature verification and signature creation. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/256617 |
Appears in Departments: | Computing Sciences |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
acknowledgement.pdf | Attached File | 137.06 kB | Adobe PDF | View/Open |
certificates.pdf | 292.06 kB | Adobe PDF | View/Open | |
chapter1.pdf | 350.29 kB | Adobe PDF | View/Open | |
chapter2.pdf | 304.51 kB | Adobe PDF | View/Open | |
chapter3.pdf | 747.99 kB | Adobe PDF | View/Open | |
chapter4.pdf | 514.53 kB | Adobe PDF | View/Open | |
chapter5.pdf | 186.89 kB | Adobe PDF | View/Open | |
chapter6.pdf | 935.26 kB | Adobe PDF | View/Open | |
chapter7.pdf | 7.49 kB | Adobe PDF | View/Open | |
contents.pdf | 15.38 kB | Adobe PDF | View/Open | |
list of publications.pdf | 433.32 kB | Adobe PDF | View/Open | |
list of tables figures.pdf | 135.84 kB | Adobe PDF | View/Open | |
references.pdf | 306.2 kB | Adobe PDF | View/Open | |
title.pdf | 85.39 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: