Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/29170
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Mobile Adhoc Network | en_US |
dc.date.accessioned | 2014-11-27T07:29:56Z | - |
dc.date.available | 2014-11-27T07:29:56Z | - |
dc.date.issued | 2014-11-27 | - |
dc.identifier.uri | http://hdl.handle.net/10603/29170 | - |
dc.description.abstract | Mobile Adhoc Networks MANETs have received significant research interest in recent newlineyears It may not be possible to deploy infrastructure Their characteristics make them vulnerable to newlinepassive and active attacks Particularly, Denial of Service attack is one such severe attack against newlineMANET Layers which is a challenging one to defend against Hence security is an important newlinechallenge while deploying MANET So security issues are analyzed for individual layers namely newlineapplication layer transpoft layer network layer link layer and physical layer Key management is the newlinecentral component of security The security keys must be generated and distributed to the newlinecommunicating nodes in a secure manner so that unauthorized users cannot compromise the newlineinformation exchanged There is no solution that provides layer wise security which is a major newlinechallenge for Mobile Adhoc networks This research effort examines the theory application and newlineresults for a Layerwise Security LaySec framework that provides security for an adhoc network newlineoperating in a hostile environment LaySec incorporates three security features Secure neighbor newlineauthentication and Layerwise Security techniques and multipath routing into its framework while newlinemaintaining network performance sufficient to operate in hostile environment lt uses Layerwise newlinesecurity techniques to protect nodes from multilayer attacks called Denial of Service attacks It uses newlinesecure neighbor authentication to provide neighboring nodes exchange messages to discover and newlineauthenticate each other The Adhoc On demand Distance Vector AODV protocol is modified to newlineutilize all discovered routes instead of the shortest route to balance the network load across multiple newlinepaths The multiple security levels of LaySec make it very robust against Denial of Service attacks in newlinehostile environment From the simulated results it is observed that the proposed approach has shown newlinebetter results in terms of Quality of Service parameters like Average packet delivery ratio Average newlinethroughput Average end to end delay Average | en_US |
dc.format.extent | 194p. | en_US |
dc.language | English | en_US |
dc.relation | - | en_US |
dc.rights | university | en_US |
dc.title | Layerwise security framework with snauthspmaodv to defend denial of service attack for mobile adhoc networks in hostile environment | en_US |
dc.title.alternative | - | en_US |
dc.creator.researcher | Devi Aruna, D | en_US |
dc.subject.keyword | Mobile Adhoc Networks | en_US |
dc.subject.keyword | DOS attack | en_US |
dc.subject.keyword | Laywise Security | en_US |
dc.description.note | Summary P. 183-184, References P. 186-192 | en_US |
dc.contributor.guide | Subashini, P | en_US |
dc.publisher.place | Coimbatore | en_US |
dc.publisher.university | Avinashilingam Deemed University For Women | en_US |
dc.publisher.institution | Department of Computer Science | en_US |
dc.date.registered | 07/09/2009 | en_US |
dc.date.completed | 18/09/2012 | en_US |
dc.date.awarded | 16/10/2014 | en_US |
dc.format.dimensions | 29 cm | en_US |
dc.format.accompanyingmaterial | CD | en_US |
dc.source.university | University | en_US |
dc.type.degree | Ph.D. | en_US |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
devi_aruna_chapter10.pdf | Attached File | 464.59 kB | Adobe PDF | View/Open |
devi aruna_chapter1.pdf | 272.09 kB | Adobe PDF | View/Open | |
devi_aruna_chapter2.pdf | 512.95 kB | Adobe PDF | View/Open | |
devi_aruna_chapter3.pdf | 196.1 kB | Adobe PDF | View/Open | |
devi_aruna_chapter4.pdf | 246.78 kB | Adobe PDF | View/Open | |
devi_aruna_chapter5.pdf | 281.42 kB | Adobe PDF | View/Open | |
devi_aruna_chapter6.pdf | 159.57 kB | Adobe PDF | View/Open | |
devi_aruna_chapter7.pdf | 228.51 kB | Adobe PDF | View/Open | |
devi_aruna_chapter8.pdf | 154.04 kB | Adobe PDF | View/Open | |
devi_aruna_chapter9.pdf | 186.59 kB | Adobe PDF | View/Open | |
devi_aruna_front_page.pdf | 282 kB | Adobe PDF | View/Open | |
devi_aruna_publications.pdf | 191.41 kB | Adobe PDF | View/Open | |
devi_aruna_references.pdf | 236.26 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: