Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/527776
Title: Dynamic Secured Approach to Mitigate Malicious Nodes in Mobile Ad Hoc Networks
Researcher: Usha, M S
Guide(s): Ravishankar, K C
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2021
Abstract: The technological developments and its improvements certainly bring newlinesolutions to the number of issues in the society. Also, could uplift the living newlinelife style of the civilization. Computer Networking is one such area or a newlinetechnology which has provided many solutions to the society by establishing newlinecommunication channel between the devices or components. Mobile Ad-hoc newlineNetworks is an emerged area from Computer Networks to assure the newlinecommunication where conventional connectivity is not possible. The newlinecommunication in the MANET is based on the identified route through the newlinecontribution of mobile node within surrounding area. The establishment of newlinethe route is dynamic and it depends on the availability of the node and its newlineacknowledgment. Because of the dynamic architecture, MANET is highly newlinevulnerable to many attacks and they are categorized as active and passive. newlineLiterature has provided various methods of categorizing the MANET attacks. newlineBut the current research work has followed the Active and Passive attacks newlinecategory. newlineAttacks in MANET namely, Black Hole, Gray Hole, Snooping, Denial of Service newline(DoS) and so on. There are several methodologies can be found in the newlineliterature towards the detection and avoidance of active and passive attacks newlinein MANET. Due to the time complexity parameter, handling of individual newlineattacks may not be feasible. Certain challenges namely, Secure route newlineestablishment and Detection and avoidance of attacks concurrently are still newlinean opportunity for any researcher. Hence, in this connection the proposed newlineresearch work is trying to define three objectives and techniques to newlineovercome these attacks. newlineMobile ad hoc networks require cooperation among the participating entities newlineto guarantee the formation and sustained existence of network services. The newlinereliability of interactions among anonymous entities is a significant issue in newlinesuch environments. The distributed entities establish connections to interact newlinewith others, which may include selfish and misbehaving entities and result in newlinedepraved experiences. Hence, e
Pagination: 115
URI: http://hdl.handle.net/10603/527776
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File152.62 kBAdobe PDFView/Open
02_prelim pages.pdf546.81 kBAdobe PDFView/Open
03_content.pdf51.96 kBAdobe PDFView/Open
04_abstract.pdf93.99 kBAdobe PDFView/Open
05_chapter 1.pdf86.28 kBAdobe PDFView/Open
06_chapter 2.pdf134.92 kBAdobe PDFView/Open
07_chapter 3.pdf630.42 kBAdobe PDFView/Open
08_chapter 4.pdf347.64 kBAdobe PDFView/Open
09_chapter 5.pdf655.68 kBAdobe PDFView/Open
10_annexures.pdf81.69 kBAdobe PDFView/Open
11_chapter 6.pdf453.96 kBAdobe PDFView/Open
80_recommendation.pdf47.83 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: