Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/342032
Title: Identification of malicious node and secure data transmission in mobile adhoc networks
Researcher: Durga Devi, S
Guide(s): Rukmanidevi, D
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Adhoc networks
Malicious node
University: Anna University
Completed Date: 2019
Abstract: A group of mobile nodes linked together to perform a particular communication task with no centralized control is called a MANET. The greatest advantage in a MANET is the lack of infrastructure, which makes it easy for each node in the network to autonomously perform direct interactions with another node, routing operations, decision making and data alteration during the communication process. MANETs are generally organized without infrastructure. Hence, they are moderately defenceless to malicious active and passive attacker that target to damage and trace the data transmission direction. Cryptographic technique can avoid several attacks. However, an attacker captures mobile nodes, evokes their cryptanalytic key and modifies their code to behave maliciously. Therefore, the malicious node detection is a significant problem in the MANET. The major objective of the proposed research work is to detect the malicious nodes and provide secure data transmission from source to destination by using two different mechanisms. They are: Malicious node and malicious Observer node Detection System; Secure Data Transmission by Network Background Free Parsing Analyzing (BFPA) for Detecting Malicious Nodes in MANET. In the first part of the research, Malicious node and malicious Observer node Detection System (MODS) in MANET is proposed. This mechanism aims to detect the malicious node and protect the data from the malicious observer in MANET. In this mechanism, the Context Free Grammar Technique detects the malicious node and Fibonacci Pascal Triangle method generates the dummy route to send confidential information from source to destination. This method produced 49.86% efficiency when compared to the existing ALERT mechanism. newline
Pagination: xvii,139 p.
URI: http://hdl.handle.net/10603/342032
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File50.74 kBAdobe PDFView/Open
02_certificates.pdf121.75 kBAdobe PDFView/Open
03_vivaproceedings.pdf297.73 kBAdobe PDFView/Open
04_bonafidecertificate.pdf158.91 kBAdobe PDFView/Open
05_abstracts.pdf45.98 kBAdobe PDFView/Open
06_acknowledgements.pdf179.65 kBAdobe PDFView/Open
07_contents.pdf77.45 kBAdobe PDFView/Open
08_listoftables.pdf76.38 kBAdobe PDFView/Open
09_listoffigures.pdf86.04 kBAdobe PDFView/Open
10_listofabbreviations.pdf15.29 kBAdobe PDFView/Open
11_chapter1.pdf432.69 kBAdobe PDFView/Open
12_chapter2.pdf204.55 kBAdobe PDFView/Open
13_chapter3.pdf423.83 kBAdobe PDFView/Open
14_chapter4.pdf314.66 kBAdobe PDFView/Open
15_chapter5.pdf948.36 kBAdobe PDFView/Open
16_chapter6.pdf13.43 kBAdobe PDFView/Open
17_conclusion.pdf13.43 kBAdobe PDFView/Open
18_references.pdf135.31 kBAdobe PDFView/Open
19_listofpublications.pdf71.11 kBAdobe PDFView/Open
80_recommendation.pdf61.73 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: