Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/582381
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2024-08-12T11:46:00Z | - |
dc.date.available | 2024-08-12T11:46:00Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/582381 | - |
dc.description.abstract | A mobile ad hoc network (MANET)] is collection of self-configuring mobile nodes with no newlineexisting pre-established topology, each mobile node in the network acts as a router. MANET is newlinecharacterized by dynamic topologies, existence of bandwidth constrained and variable capacity newlinelinks, energy constrained operations and are highly prone to security threats. Due to all these newlinefeatures routing is a major issue in ad hoc networks. Now a day s many researchers concentrate newlinein security and efficiency of MANET. Efficiency based on multi-path and node disjoint routing, newlineenergy, delay, high packet delivery ratio (PDR), and congestion control issues etc. Although newlinethere exists various challenges and problems in MANET but the objective of our research to newlineenhance the security of MANET and enhance the efficiency of MANET routing protocols. newlineThere exist various types of attack in MANET broadly classified as active attack and newlinepassive attack in MANET. Active attack are those attacks which can directly affect the entire the newlinenetwork i.e. the attacker can drop or change the entire packet of affected node. Spoofing, newlinefabrication, wormhole attack, modification, Denial of Service (DoS), Sybil Attack, black hole newlineand Gray hole and Rushing attack are example of active attack, in the other hand passive attack newlineare those attacks in which the intruder does not affect the entire network but try to listen specific newlinetype of information. Traffic Analysis, Eavesdropping, Monitoring and Tapping are the example newlineof passive attacks. To identifying of passive attack is harder than active attack in any network. newline | |
dc.format.extent | viii,207p | |
dc.language | English | |
dc.relation | Yes | |
dc.rights | university | |
dc.title | Towards enhancement of security and efficiency in manet | |
dc.title.alternative | ||
dc.creator.researcher | Hassan, Khondekar Lutful | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Telecommunications | |
dc.description.note | ||
dc.contributor.guide | Mandal, Jyotsna Kumar | |
dc.publisher.place | Kalyani | |
dc.publisher.university | University of Kalyani | |
dc.publisher.institution | Computer Science and Engineering | |
dc.date.registered | 2019 | |
dc.date.completed | 2021 | |
dc.date.awarded | 2021 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 86.74 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.63 MB | Adobe PDF | View/Open | |
03_content.pdf | 104.36 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 1.37 MB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 2.8 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 556.76 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.1 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.07 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 406.5 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 430.15 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 266.56 kB | Adobe PDF | View/Open | |
12_annexures.pdf | 156.22 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 87.41 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: