Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/312285
Title: Effect of Security Breaches in the Behaviour of Reactive Routing Protocols for Manets
Researcher: SEN BISWARAJ
Guide(s): Sharma Kalpana, Ghose Kanti Mrinal
Keywords: Computer Science
Engineering and Technology
Telecommunications
University: Sikkim Manipal University
Completed Date: 2020
Abstract: Mobile Ad hoc Networks (MANETs) are self-organized, self-configuring collection of autonomous mobile nodes that temporarily forms network and does not require any infrastructure or centralized administration for data communication. These mobile nodes use unguided transmission medium (wireless medium) thereby giving them freedom of mobility across the network. MANETs being low cost networks with ease of deployment has made it popular in wide application areas viz military application, commercial application, traffic management, disaster management to name a few. Since MANETs does not require any centralized administration, the routing protocols heavily rely on the cooperation of all participant nodes in the network. Though the characteristics of MANETs simplicity, ease of deployment and non-existence of centralized infrastructure or administration are found attractive, the network is vulnerable to threats from malicious nodes which can lead to disruption of the network. The routing protocols available for MANETs also does not provide any mechanism to counter threats or identify malicious nodes or behavior in the network. newlineWhile MANETs are of great advantage for establishment of fly-in network, malicious nodes pose as great threat on the overall performance of the network and its associated application. In this context, this research is aimed to find and evaluate the performance of routing protocols when exposed to threats / maliciousness. newlineThough MANETs in general, are extremely vulnerable to different types of attacks across all layers of protocol stack, the network layer security issues draw special attention due to the cooperative routing protocols being followed in such networks thus giving ample opportunity to the attackers to exploit the network layer and disturb or even bring down the network operation. Though there are various types of attacks that are possible to becarried out at the network layer, few amongst them are found to be lethal and cause great damage to the network. newline
Pagination: 
URI: http://hdl.handle.net/10603/312285
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdf.pdfAttached File24.1 kBAdobe PDFView/Open
02_certificate.pdf.pdf972.02 kBAdobe PDFView/Open
03_preliminary pages.pdf1.84 MBAdobe PDFView/Open
10_chapter 1.pdf293.29 kBAdobe PDFView/Open
11_chapter 2.pdf325.94 kBAdobe PDFView/Open
12_chapter 3.pdf807.3 kBAdobe PDFView/Open
13_chapter 4.pdf319.36 kBAdobe PDFView/Open
14_chapter 5.pdf516.95 kBAdobe PDFView/Open
15_chapter 6.pdf479.69 kBAdobe PDFView/Open
16_chapter 7.pdf429.85 kBAdobe PDFView/Open
17_chapter 8.pdf332.05 kBAdobe PDFView/Open
18_chapter 9.pdf233.1 kBAdobe PDFView/Open
19_appendix_bibliography.pdf306.33 kBAdobe PDFView/Open
20_appendix_profile of scholar_supervisors.pdf166.88 kBAdobe PDFView/Open
80_recommendation.pdf254.49 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: