Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/357901
Title: Mitigating Attacks with Encryption Based Secure Routing Protocol
Researcher: V M Gayathri
Guide(s): R Nedunchelian
Keywords: Economics and Business
Management
Social Sciences
University: Saveetha University
Completed Date: 2019
Abstract: In this digitalized era, Mobile Ad-hoc Networks (MANET) play a vital newlinerole in the field of communication networks. MANET is a decentralized newlinenetwork in which each node acts as a router for passing information from newlinesource node to the destination node. MANETs are applicable for many real newlinetime scenarios. There are many challenges which are open for the newlineresearcher to do research in this field and bring out some innovative ideas newlineto identify the challenges and rectify them. However, security plays a newlinesignificant part which adds complexity into the network. Each node in the newlinenetwork must communicate effectively to provide an efficient newlinecommunication system. Since each node in the network is mobile in newlinenature, it is impossible to predict the positions of the nodes, network newlineinfrastructure and network decomposition. Because of mobility, any node newlinecan join the network when it enters the range. So, the network becomes newlinemore vulnerable to any kind of attacks. Any attacker node can join the newlinenetwork and gives communication overhead. newlineThis research work concentrates on mitigating multiple attacks in newlineMANET by choosing the neighbor node based on the promising factor of newlineeach and every individual node. In this work, the malicious nodes are newlineadded into the network and the network will be monitored to identify newlinedifferent types of attacks such as packet dropping, black-hole and greyhole newlineattacks. A malicious node which simply drops the packet whatever it newlinereceives will be placed in the network. Each and every node in the newlinenetwork is analyzed by measuring the performance factors such as newlinePacket Delivery Ration (PDR) and energy consumed by the node. The newlinecomparisons of the network performances will be done by including the newlinemalicious node and without including the malicious node in the network. newlineBased on the results obtained from the simulation, the intruder node will newlinebe identified newline
Pagination: 
URI: http://hdl.handle.net/10603/357901
Appears in Departments:Management

Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: