Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/461825
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial176
dc.date.accessioned2023-02-18T08:10:18Z-
dc.date.available2023-02-18T08:10:18Z-
dc.identifier.urihttp://hdl.handle.net/10603/461825-
dc.description.abstractMobile Ad-hoc Networks (MANETs) represents the interconnection of heterogeneous battery powered mobile nodes with self-organizing capability in an infrastructure less environment. MANETs possesses different computational capabilities and resources availability. In specific, the distributed and dynamic characteristics of MANETs makes them more ideal and suitable for its deployment in the conditions of volatility and extremity. They are identified to be excellent candidates for application in several domains that include rescue operations, environmental monitoring, and military operations, etc. The restricted range of wireless communication and dynamic change in node mobility necessitates maximized range of cooperation among them for during the process of facilitating networking services. Thus, the mobile nodes play an indispensable role of a host and a router. However, the distributed and dynamic nature of MANETs make them vulnerable to different kinds of attacks that include Denial of Service (DoS) attack, Internet Protocol (IP) spoofing, traffic distortion, wormhole, sinkhole, blockhole, etc. The malicious node intruding into the network increases the probability of launching attack against cooperative nodes and crumble the overall performance of the complete network. MANETs on par with its counterpart wired network does not possess a ideal checkpoints like switches and routers over which Intrusion Detection System (IDS) can be deployed. In MANETs, each mobile nodes need to run its own IDS by operating in a promiscuous mode due to the absence of any centralized monitoring entity. At this juncture, it is not possible to run the IDS continuously in mobile node due to its limited battery life. In this context, design, and development of IDS schemes with energy efficiency is essential for sustaining high accuracy and detection rate during attack detection. In this thesis, four swarm intelligent optimization clustering algorithms-based IDS schemes is proposed for achieving maximized throughput, and detectio
dc.format.extent2683kB
dc.languageEnglish
dc.relation133
dc.rightsuniversity
dc.titleIntrusion Detection in MANETs Using Nature Inspired Algorithms Based Clustering Techniques
dc.title.alternative
dc.creator.researcherFouziah M
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.subject.keywordTelecommunications
dc.description.note
dc.contributor.guideS. Maria Celestin Vigila
dc.publisher.placeKanyakumari
dc.publisher.universityNoorul Islam Centre for Higher Education
dc.publisher.institutionDepartment of Computer Applications
dc.date.registered2014
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensionsA4
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Applications

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File614.49 kBAdobe PDFView/Open
abstract.pdf79.21 kBAdobe PDFView/Open
annexures.pdf231.2 kBAdobe PDFView/Open
chapter 1.pdf196.77 kBAdobe PDFView/Open
chapter 2.pdf118.98 kBAdobe PDFView/Open
chapter 3.pdf542.53 kBAdobe PDFView/Open
chapter 4.pdf237.35 kBAdobe PDFView/Open
chapter 5.pdf607.34 kBAdobe PDFView/Open
chapter 6.pdf896.29 kBAdobe PDFView/Open
chapter 7.pdf49.97 kBAdobe PDFView/Open
prelim pages.pdf2.58 MBAdobe PDFView/Open
table of contents.pdf82.9 kBAdobe PDFView/Open
title page.pdf149.84 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: