Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/41943
Title: Design of credit based hybrid schemes To detect blackhole attacks in Mobile ad hoc networks using soft Computing frameworks
Researcher: Vydeki D
Guide(s): Bhuvaneswaran R S
Keywords: Infrastructure Routing
Mobile ad hoc network
Upload Date: 20-May-2015
University: Anna University
Completed Date: 01/02/2014
Abstract: A mobile ad hoc network MANET is a wireless multi hop newlinenetwork without any fixed infrastructure Routing in MANETs relies on the newlinetrustworthiness of all the nodes that participate in the routing process Routing newlinetable poisoning blackhole gray hole wormhole and Byzantine are some of newlinethe routing attacks aimed at the routing protocols of MANET Blackhole newlineattack is one of the virulent attacks that paralyze the process of the routing newlineprotocol and consequently the network operation The wireless node that newlinelaunches the blackhole attack strategically places itself in the active newlinecommunication path by sending fake routing information and drops the data newlinepackets instead of forwarding to the destination Securing MANET against newlineblackhole attacks is a challenging and complex task Many secure newlinemechanisms are available to thwart the routing attacks Nevertheless these newlinemechanisms are not adequate when authentic wireless nodes are compromised newlineand blackhole attacks are launched Hence it is essential to provide a second newlinelevel of defence in the form of Intrusion Detection System IDS that newlinemonitors the events occurring in the networks and reports about the intrusive newlinebehaviour of a node that initiates blackhole attack newlineIn this research work certain schemes are designed to detect newlineblackhole attacks using soft computing approaches such as fuzzy logic newlinegenetic algorithm and neural networks A cross layer approach has also been newlineemployed in the design of fuzzy neuro fuzzy detection schemes newlineThe hybrid schemes designed in this research work combine the newlineanomaly and specification based detection methods The anomaly method newlinedemands the automatic computation of the threshold values to define normal newlinebehavior such as user login access patterns and usage of resources In the newlinespecification based technique newline
Pagination: xxii, 158p.
URI: http://hdl.handle.net/10603/41943
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File36.7 kBAdobe PDFView/Open
02_certificate.pdf606.54 kBAdobe PDFView/Open
03_abstrcat.pdf38.5 kBAdobe PDFView/Open
04_acknowledgement.pdf20.28 kBAdobe PDFView/Open
05_content.pdf60.18 kBAdobe PDFView/Open
06_chapter1.pdf86.78 kBAdobe PDFView/Open
07_chapter2.pdf38.77 kBAdobe PDFView/Open
08_chapter3.pdf249.03 kBAdobe PDFView/Open
09_chapter4.pdf218.11 kBAdobe PDFView/Open
10_chapter5.pdf185.89 kBAdobe PDFView/Open
11_chapter6.pdf67.59 kBAdobe PDFView/Open
12_chapter7.pdf705.71 kBAdobe PDFView/Open
13_chapter8.pdf43.82 kBAdobe PDFView/Open
14_chapter9.pdf29.37 kBAdobe PDFView/Open
15_appendix.pdf117.03 kBAdobe PDFView/Open
16_reference.pdf26.77 kBAdobe PDFView/Open
17_publication.pdf20.73 kBAdobe PDFView/Open
18_vitae.pdf16.37 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: