Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/527776
Title: | Dynamic Secured Approach to Mitigate Malicious Nodes in Mobile Ad Hoc Networks |
Researcher: | Usha, M S |
Guide(s): | Ravishankar, K C |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2021 |
Abstract: | The technological developments and its improvements certainly bring newlinesolutions to the number of issues in the society. Also, could uplift the living newlinelife style of the civilization. Computer Networking is one such area or a newlinetechnology which has provided many solutions to the society by establishing newlinecommunication channel between the devices or components. Mobile Ad-hoc newlineNetworks is an emerged area from Computer Networks to assure the newlinecommunication where conventional connectivity is not possible. The newlinecommunication in the MANET is based on the identified route through the newlinecontribution of mobile node within surrounding area. The establishment of newlinethe route is dynamic and it depends on the availability of the node and its newlineacknowledgment. Because of the dynamic architecture, MANET is highly newlinevulnerable to many attacks and they are categorized as active and passive. newlineLiterature has provided various methods of categorizing the MANET attacks. newlineBut the current research work has followed the Active and Passive attacks newlinecategory. newlineAttacks in MANET namely, Black Hole, Gray Hole, Snooping, Denial of Service newline(DoS) and so on. There are several methodologies can be found in the newlineliterature towards the detection and avoidance of active and passive attacks newlinein MANET. Due to the time complexity parameter, handling of individual newlineattacks may not be feasible. Certain challenges namely, Secure route newlineestablishment and Detection and avoidance of attacks concurrently are still newlinean opportunity for any researcher. Hence, in this connection the proposed newlineresearch work is trying to define three objectives and techniques to newlineovercome these attacks. newlineMobile ad hoc networks require cooperation among the participating entities newlineto guarantee the formation and sustained existence of network services. The newlinereliability of interactions among anonymous entities is a significant issue in newlinesuch environments. The distributed entities establish connections to interact newlinewith others, which may include selfish and misbehaving entities and result in newlinedepraved experiences. Hence, e |
Pagination: | 115 |
URI: | http://hdl.handle.net/10603/527776 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 152.62 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 546.81 kB | Adobe PDF | View/Open | |
03_content.pdf | 51.96 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 93.99 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 86.28 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 134.92 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 630.42 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 347.64 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 655.68 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 81.69 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 453.96 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 47.83 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: