Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/312285
Title: | Effect of Security Breaches in the Behaviour of Reactive Routing Protocols for Manets |
Researcher: | SEN BISWARAJ |
Guide(s): | Sharma Kalpana, Ghose Kanti Mrinal |
Keywords: | Computer Science Engineering and Technology Telecommunications |
University: | Sikkim Manipal University |
Completed Date: | 2020 |
Abstract: | Mobile Ad hoc Networks (MANETs) are self-organized, self-configuring collection of autonomous mobile nodes that temporarily forms network and does not require any infrastructure or centralized administration for data communication. These mobile nodes use unguided transmission medium (wireless medium) thereby giving them freedom of mobility across the network. MANETs being low cost networks with ease of deployment has made it popular in wide application areas viz military application, commercial application, traffic management, disaster management to name a few. Since MANETs does not require any centralized administration, the routing protocols heavily rely on the cooperation of all participant nodes in the network. Though the characteristics of MANETs simplicity, ease of deployment and non-existence of centralized infrastructure or administration are found attractive, the network is vulnerable to threats from malicious nodes which can lead to disruption of the network. The routing protocols available for MANETs also does not provide any mechanism to counter threats or identify malicious nodes or behavior in the network. newlineWhile MANETs are of great advantage for establishment of fly-in network, malicious nodes pose as great threat on the overall performance of the network and its associated application. In this context, this research is aimed to find and evaluate the performance of routing protocols when exposed to threats / maliciousness. newlineThough MANETs in general, are extremely vulnerable to different types of attacks across all layers of protocol stack, the network layer security issues draw special attention due to the cooperative routing protocols being followed in such networks thus giving ample opportunity to the attackers to exploit the network layer and disturb or even bring down the network operation. Though there are various types of attacks that are possible to becarried out at the network layer, few amongst them are found to be lethal and cause great damage to the network. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/312285 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf.pdf | Attached File | 24.1 kB | Adobe PDF | View/Open |
02_certificate.pdf.pdf | 972.02 kB | Adobe PDF | View/Open | |
03_preliminary pages.pdf | 1.84 MB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 293.29 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 325.94 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 807.3 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 319.36 kB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 516.95 kB | Adobe PDF | View/Open | |
15_chapter 6.pdf | 479.69 kB | Adobe PDF | View/Open | |
16_chapter 7.pdf | 429.85 kB | Adobe PDF | View/Open | |
17_chapter 8.pdf | 332.05 kB | Adobe PDF | View/Open | |
18_chapter 9.pdf | 233.1 kB | Adobe PDF | View/Open | |
19_appendix_bibliography.pdf | 306.33 kB | Adobe PDF | View/Open | |
20_appendix_profile of scholar_supervisors.pdf | 166.88 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 254.49 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Altmetric Badge: