Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/256617
Title: A Novel Next Generation Encryption as a Water Mark in Achieving Authentication Security for Mobile Ad Hoc Network
Researcher: Charles Arockiaraj M.
Guide(s): P. Mayilvahanan
University: Vels University
Completed Date: 
Abstract: Presently a day, Security is greatest worry for each kind of associations and newlineindividuals. It is furthermore leading topic in the Mobile ad hoc network (MANET) newlineparticularly as for size including intricacy of the system. MANET is a self-governing mobile newlinenodes system associated through wireless links. Every node functions like an end system, newlineadditionally being a router for the onward packets. All nodes are permitted to travel and newlinecompose themselves into a system and these nodes vary position habitually. A MANET has newlinebeen deliberated as a sort of ad hoc system which changes areas and positions their own on newlinethe hover. MANETS are portable (mobile), so they utilize connection of wireless to interface newlinewith different networks. There is an absenteeism of approved firewall in MANET. The result newlineof this MANET was the objective for a few security assaults. MANET shows various attacks newlinebe contingent on the security threads. Each network protocol s layer stack influenced since newlineabundant attacks natures. newlineThis revision recommends several hybrid algorithms to notice and reduce these kinds newlineof threads. Ad-Hoc networks need very particular security methods. Certain attacks in newlineparticular black hole and worm hole attack and couple of different DoS attacks are diminished newlinecontingent on the hybrid systems proposed in this review. The secure authentication protocol newlineand the hybrid methodology are planned centered on ECKCDSA SHA512 function of hash to newlinerecuperate the misbehavior nodes findings using the attacker increasing the safekeeping of the newlinearrangement. The protocols are scrutinized beneath the strongest attack model enduring the newlinestep process defining the network refuge within the DOS assault model. newline21 newlineLastly, the routine parameters are included by the prediction of accurateness and its newlinemischief nodes, besides proposed system s verification protocol under dissimilar perspectives newlinewith signature verification and signature creation. newline
Pagination: 
URI: http://hdl.handle.net/10603/256617
Appears in Departments:Computing Sciences

Files in This Item:
File Description SizeFormat 
acknowledgement.pdfAttached File137.06 kBAdobe PDFView/Open
certificates.pdf292.06 kBAdobe PDFView/Open
chapter1.pdf350.29 kBAdobe PDFView/Open
chapter2.pdf304.51 kBAdobe PDFView/Open
chapter3.pdf747.99 kBAdobe PDFView/Open
chapter4.pdf514.53 kBAdobe PDFView/Open
chapter5.pdf186.89 kBAdobe PDFView/Open
chapter6.pdf935.26 kBAdobe PDFView/Open
chapter7.pdf7.49 kBAdobe PDFView/Open
contents.pdf15.38 kBAdobe PDFView/Open
list of publications.pdf433.32 kBAdobe PDFView/Open
list of tables figures.pdf135.84 kBAdobe PDFView/Open
references.pdf306.2 kBAdobe PDFView/Open
title.pdf85.39 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: