Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/427553
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | A Framework on trust management techniques for optimal secure communications in mobile AD HOC networks | |
dc.date.accessioned | 2022-12-18T09:39:42Z | - |
dc.date.available | 2022-12-18T09:39:42Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/427553 | - |
dc.description.abstract | The rapid development of MANET creates a center of attention in the minds of academic researchers and developers of industrial applications. The emergency rescue operations like flood, earthquake, military, police and safety-critical business operations need the applications that support real time safety and secured transmission. In such emergency rescue cases, infrastructure networks may get damaged and rescue teams may rely upon infrastructure less MANET to carry the successful communication. But MANET is vulnerable to several attacks and security threats as MANET supports wireless and infrastructure less communication. In such a dynamic network, the attacker listens to the data, inserts fake packets or changes the content of the data. In a MANET, all the available nodes are used for routing and forwarding the packets. Sometimes a node may agree to forward packets, but misbehave later if it is selfish, malicious, broken, or overloaded. Malicious attacks like black hole are more vulnerable and they affect the performance of the network very badly. Hence the identifying the malicious nodes from network seems to be serious issue in MANET. Several trust based approaches and Intrusion detection techniques have been proposed, but the issues are not solved completely. newlineMobile ad hoc network (MANET) is an infrastructure-less and self-configuring in which the mobile nodes are moving autonomously through the wireless network interfaces within the communication range. Due to lack of trusted centralized authority, MANET is susceptible to security attacks. newline | |
dc.format.extent | xvii,158p. | |
dc.language | English | |
dc.relation | p.147-157 | |
dc.rights | university | |
dc.title | A Framework on trust management techniques for optimal secure communications in mobile AD HOC networks | |
dc.title.alternative | ||
dc.creator.researcher | Anitha Josephine, J | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | MANET | |
dc.subject.keyword | Dynamic network | |
dc.subject.keyword | Tanimoto Support | |
dc.description.note | ||
dc.contributor.guide | Senthilkumar, S | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2020 | |
dc.date.awarded | 2020 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 102.85 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 0 B | Adobe PDF | View/Open | |
03_content.pdf | 372.06 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 368.92 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 628.27 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 551.32 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 789.11 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.2 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.15 MB | Adobe PDF | View/Open | |
10_annexures.pdf | 180.75 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 138.52 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: