Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/518124
Title: Secure Routing Protocol Against Internal And External Attack In Manet
Researcher: NITESH ASHOKJI GHODICHOR
Guide(s): RAJ THANEEGHAIVEL. V
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Sarvepalli Radhakrishnan University
Completed Date: 2023
Abstract: The mobile adhoc network refers to the collection of mobile nodes that communicate with each other over wireless links as they move from one location to another. MANET is an infrastructure-less network with a dynamic topology; as a result of this, the network is extremely vulnerable to assaults. The prevention of attacks in MANET is a significant challenge. Attacks originate from nodes in the network that are acting maliciously. Attacks can take many forms in MANET, and each one modifies the functioning of the network in its own unique way. Attacks can generally be divided into two categories: those that target the data traffic on a network and those that target the control traffic on a network. An explanation of the numerous assault types, their effects on MANET, and the protection systems in place at the time are given in this study or thesis. The suggested Secure Routing Algorithm that employs blockchain technology (SRABC), which also authenticates nodes, protects MANET from attacks. The secure routing algorithm (SRA) that is suggested with blockchain technology protects control and data traffic from attacks. This is accomplished by the creation of a Hash Function for each transaction. The first part describes the safety of the MANET. The second part of thesis includes the function of blockchain in MANET security. The SRA is described in conjunction with blockchain in the third section. In the fourth section, PDR and Throughput are utilised in order to conduct an SRA evaluation using Blockchain. The findings indicate that the proposed strategy improves MANET security while simultaneously lowering the amount of delay. The performance of the suggested method is analysed and compared to that of the Q-AODV and DSR routing protocols. newlineKeywords: Mobile Adhoc Network, Secure Routing Algorithm, Malicious Nodes, Attack Prevention, Blockchain.
Pagination: 
URI: http://hdl.handle.net/10603/518124
Appears in Departments:COMPUTER SCIENCE & ENGINEERING

Files in This Item:
File Description SizeFormat 
10 chapter 6.pdfAttached File126.49 kBAdobe PDFView/Open
11 annexure.pdf3.53 MBAdobe PDFView/Open
1 title page.pdf128.55 kBAdobe PDFView/Open
2 prilim pages.pdf514.88 kBAdobe PDFView/Open
3 content.pdf160.79 kBAdobe PDFView/Open
4 abstract.pdf81.15 kBAdobe PDFView/Open
5 chapter 1.pdf461.42 kBAdobe PDFView/Open
6 chapter 2.pdf185.46 kBAdobe PDFView/Open
7 chapter 3.pdf478.04 kBAdobe PDFView/Open
80_recommendation.pdf395.09 kBAdobe PDFView/Open
8 chapter 4.pdf580.58 kBAdobe PDFView/Open
9 chapter 5.pdf140.57 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: