Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/331309
Title: | Secure routing over heterogeneous wireless networks |
Researcher: | Elamathi N |
Guide(s): | Jayashri S |
Keywords: | Engineering and Technology Computer Science Computer Science Software Engineering Secure routing wireless networks |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | A Heterogeneous wireless network is interconnected with multiple autonomous systems (AS) or multiple networks. Each autonomous system has a unique identity as the number, IP address, different data rate, various mobility speeds, issues, attacks, and different performance metrics. The network formation is a greater challenge in terms of compatibility. There is a need to integrate different types of networks through some interface core network. Today Internet world having this kind of network called Heterogeneous wireless networks. For seamless traffic consideration, there are two major requirements such as routing among multiple AS and security for the routing process. The routing processes in multiple homogeneous networks are an Intra-domain routing and multiple heterogeneous networks are called an Inter-domain routing protocol. The Border gateway routing protocol is an Inter-domain routing protocol that is also classified into two types interior (IBGP) and exterior BGP (EBGP). The routing process within the AS is IBGP and routing between dissimilar AS is referred to EBGP. The heterogeneous wireless network uses EBGP. Here the different kinds of users can access the network. The security for the user, network resources, and information are necessary. Because the BGP routing protocol has many issues and attacks due to the lack of security. Many security algorithms have been proposed but those algorithms were not able to provide strong and efficient security solutions. Because the harmful malicious activities are performed by the malicious user s ratio has been increased by day to day internet digital world. Most of the attacks are arises concerning security features newline |
Pagination: | xvii,160 p. |
URI: | http://hdl.handle.net/10603/331309 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 101.86 kB | Adobe PDF | View/Open |
02_certificates.pdf | 118.12 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 803.1 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 77.25 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 62.02 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 152.58 kB | Adobe PDF | View/Open | |
07_contents.pdf | 19.36 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 4.36 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 7.87 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 5.42 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 359.82 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 406.05 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 613.78 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 496.48 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 381.95 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 448.47 kB | Adobe PDF | View/Open | |
17_chapter7.pdf | 179.52 kB | Adobe PDF | View/Open | |
18_conclusion.pdf | 179.52 kB | Adobe PDF | View/Open | |
19_references.pdf | 214.76 kB | Adobe PDF | View/Open | |
20_listofpublications.pdf | 175.71 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 74.57 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: