Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/457951
Title: | Mobile Agents Security in Mobile Adhoc Networks |
Researcher: | Chethan, B K |
Guide(s): | Jayanna, S H and Siddappa, M |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2020 |
Abstract: | Mobile agents are adopted to discover services in Mobile Adhoc Networks (MANET), where newlineagents migrate, collect information, and contributing to better connectivity and seamless newlinecommunication. This also indicates that if a mobile agent compromises with the attacker, newlinethen it can cause a severe impact on the overall functionality of MANET. However, in the newlineabsence of efficient evidence that the services provided by mobile agents are legitimate, the newlineuse of mobile agents in MANET is quite vulnerable. Unfortunately, very less attention has newlinebeen paid to the reliability assessment of mobile agent systems in the MANET. The proposed newlinestudy has reviewed the existing literature in the context of MANET security and has explored newlinesecurity vulnerabilities and associated challenges in the existing techniques. The critical newlinefindings exhibited that ensuring a higher level of resistance to a variety of threats and newlinepotential security attacks in MANET is still an open and unresolved issue. Instead of just newlineimproving the traditional security schemes, the proposed research work evolve up with a newlinemore lightweight but robust security approach that is able to maintain a good balance newlinebetween communication demand and security demands. The contribution of the proposed newlineresearch work is two-fold. First a novel framework is constructed for securing mobile agents newlineusing trust correlation modelling, communication policy, and decision-making strategy. It newlineaddresses the problem of the identification of malicious nodes attempting to invoke a newlinedynamic attack. Another solution has introduced as a framework for optimizing security newlineusing a dynamic pass phrase that adds an optimal performance to the prior implementation. newlineThis framework is evolving up with secure pass phrase management, where a lightweight newlineencryption strategy has been used in order to further strengthen up the prevention mechanism newlinetowards lethal attacks in Mobile Adhoc Networks. newlineThe proposed security mechanism is based on an analytical approach and is newlineimplemented on a numeric |
Pagination: | vii, 122 |
URI: | http://hdl.handle.net/10603/457951 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 347.98 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.13 MB | Adobe PDF | View/Open | |
03_content.pdf | 187.03 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 84.09 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 363.11 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 304.06 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 305.17 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 368.77 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 463.09 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 292.4 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 239.78 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: