Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/454385
Title: | Revealing and averting the black hole attacks in mobile ad hoc networks |
Researcher: | Elamparithi P |
Guide(s): | Ruba Soundar K |
Keywords: | Black Hole Attack Optimized Path Model Mobile Ad Hoc Networks |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | infrastructure. Probably, in the network each node in turn communicates with one another by means of wireless links. Moreover, the dynamic topology of nodes in the MANET demands their duty vitally for offering the network security. The network security is achieved by means of black hole attack prediction and identification. In this approach, a novel system of fuzzy inference is designed based on the certificate authority, trust valve, authentication of node, message integrity and energy level for the black hole attack detection. The proposed work mostly concentrates on the authentication of node. In MANET, prior to the process of initiating route discovery, the simulation is carried with the use of network simulator NS2, in which the system of fuzzy inference design offers improved performance on offering the certificates to the trusted nodes only. This in turn aids in the detection and prevention of malicious nodes using black hole attack. The enhancement on packet delivery ratio augments in throughput which also reduces the End to End Delay by better performance outcomes. From this, it is evident that the system is more recovered and reliable for their military application. The key objective of the first stage proposed work mainly concentrates MANETs on the node authentication before enabling the route discovery process. Here, fuzzy inference system is designed to the black hole attack identification, which depends on the node authentication, trust values, certificate authority, energy level and message integrity. newlineDeveloping highly efficient routing protocols for Mobile Ad hoc Networks (MANETs) is a challenging task. In order to fulfill multiple routing requirements such as low packet delay, high packet delivery rate and effective adaptation to network topology changes with low control overhead and so on. newline |
Pagination: | xiv,123p. |
URI: | http://hdl.handle.net/10603/454385 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.18 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.21 MB | Adobe PDF | View/Open | |
03_content.pdf | 187.2 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 180.67 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 661.5 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 400.11 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.19 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 736.54 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 808.47 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 220.15 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 135.17 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: