Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/341586
Title: | Investigations on the identification of trustbased optimum route using direct and indirect observations for mobile adhoc networks |
Researcher: | Sargunavathi, S |
Guide(s): | Martin Leo Manickam, J |
Keywords: | Engineering and Technology Engineering Engineering Electrical and Electronic Ad-hoc networks Wireless communication |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Mobile Ad-hoc Network (MANET) has been the focus of recent developments in wireless communication paradigm. Nowadays, MANET becomes more important due to its applications in certain critical areas like military, disaster management, rescue operation etc. MANET is a continuously self-configuring, infrastructure-less network of mobile nodes connected wirelessly. There is no fixed infrastructure in MANET and all communicating nodes are not stationary in nature. This results in a dynamic topology. MANET has several attractive features over conventional networks, such as low cost, quick deployment and minimal configuration. MANET consists of many mobile nodes, where each node performs the role of a node as well as a router. Communication between two nodes takes place through intermediate nodes (Cho et al. 2011). MANET has various security threats which affect the packet transmission. Security has become a primary concern between mobile nodes in a hostile environment. Intriguing MANET security problem is the provision of secure routing in the presence of malicious nodes or compromised nodes.It is not an easy task to identify the compromised nodes in the normal functioning of the network. So, the packet delivery is not guaranteed when compromised nodes are presented in the network. These compromised nodes force to use poor routes (e.g., long routes), drop, misroute and corrupt the transmission of data packets. Hence, secure routing is one of the major challenges in MANET. This issue motivates to propose collaborative secure routing protocol to thwart network layer attacks in MANET. Therefore, the first protocol namely Collaborative Trust based Secure Routing protocol (CTSR) is proposed. CTSR identifies the trustworthiness nodes and compromised nodes in the network. CTSR usestwo way acknowledgement-based framework. CTSR computes trust value by using both direct and indirect observations. CTSR uses Dempster-Shafer Theory (DST) for computing indirect trust values. Proposed CTSR handles uncertainty reasoning. Proposed |
Pagination: | xviii,119 p. |
URI: | http://hdl.handle.net/10603/341586 |
Appears in Departments: | Faculty of Electrical Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.46 kB | Adobe PDF | View/Open |
02_certificates.pdf | 145.8 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 476.85 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 354.46 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 8.84 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 426.47 kB | Adobe PDF | View/Open | |
07_contents.pdf | 7.58 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 2.63 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 4.88 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 8 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 117.09 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 71.66 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 584.08 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 375.66 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 23.83 kB | Adobe PDF | View/Open | |
16_references.pdf | 46.48 kB | Adobe PDF | View/Open | |
17_listofpublications.pdf | 16.02 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 60.19 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: