Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/395184
Title: | An Efficient Secure Routing and Group Key Management for Mobile Adhoc Networks |
Researcher: | Sivakumar, C |
Guide(s): | Nalini, C |
Keywords: | Computer Science Engineering and Technology Telecommunications |
University: | Bharath University |
Completed Date: | 2021 |
Abstract: | Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. The Mobile ad hoc network requires a highly flexible technology for establishing communications in situations which demand a fully decentralized network without any base stations, such as battlefields, military applications, and other emergency and disaster situations, to prevent the internal attack AOSR protocol is proposed in our work by expanding the AODV protocol, which works as indicated by the novel trust instrument, an improved appropriated trusted secure routing protocol. To prevent the internal attack, the trust estimations of its neighbor nodes are important. This thesis proposed technique adjusts the traditional AODV routing protocol with the limitations of trust rate, energy, and mobility as per the malicious behavior expectation. The trust rate is characterized by the packet grouping ID coordinating from the log reports of neighbor nodes, which takes out the malicious report generation. The trust level is expanded by utilizing the immediate and roundabout trust perception plans. The trusted node is checked whether it is inside the communication go or not, with the assistance of received sign quality pointer. Encryption, authentication, and key management are widely used to prevent external (outsider) attacks. however, face many challenges in ad-hoc networks. This thesis proposed enhanced key management protocols and techniquesto prevent the external attack and improved the performance of Group key management parameters. This thesis also considers for Intruder Detection System in MANETs Insider attackers conceal themselves by marki |
Pagination: | |
URI: | http://hdl.handle.net/10603/395184 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 89.3 kB | Adobe PDF | View/Open |
02_declaration.pdf | 545.22 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 612.05 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 357.63 kB | Adobe PDF | View/Open | |
05_content.pdf | 214.82 kB | Adobe PDF | View/Open | |
06_list of tables and figure.pdf | 437.36 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 147.05 kB | Adobe PDF | View/Open | |
08_chapter_1.pdf | 379.02 kB | Adobe PDF | View/Open | |
09_chapter_2.pdf | 321.29 kB | Adobe PDF | View/Open | |
10_chapter_3.pdf | 239.05 kB | Adobe PDF | View/Open | |
11_chapter_4.pdf | 873.92 kB | Adobe PDF | View/Open | |
12_chapter_5.pdf | 660.38 kB | Adobe PDF | View/Open | |
13_chapter_6.pdf | 507.8 kB | Adobe PDF | View/Open | |
14_chapter_7.pdf | 1.05 MB | Adobe PDF | View/Open | |
15_chapter_8.pdf | 157.06 kB | Adobe PDF | View/Open | |
16_annexure.pdf | 262.63 kB | Adobe PDF | View/Open | |
17_bibliography.pdf | 4.87 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 243.05 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: