Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/610295
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-12-30T08:41:50Z-
dc.date.available2024-12-30T08:41:50Z-
dc.identifier.urihttp://hdl.handle.net/10603/610295-
dc.description.abstractAdvancement in wireless technology with hand-held computing devices has brought a revolutionary change to the world of mobile communication. Ad hoc networks are mostly suited in infrastructure less and cost effective environment. Frequent changes in the network topology and limited battery access are the big challenges to create an ad hoc network as the nodes are free to move anywhere. Due to such conditions, availability of the routes depends on the neighboring links or nodes to form a best possible route in the ad hoc networks. newline newlineDistributedcommunicationsystems likee-commerce,peer-to-peernetworks, social networks and mobile ad hoc network requires equal cooperation among the participating nodes to ensure the sustainability and existence of network services throughout the acquired area. Sudden entry of any other nodes like selfish and misbehaving nodeswill causeharmto thenetwork.Therefore, network security and trustworthiness factor are the essential issues in MANET especially when it comesto size, mobility and complexity of the network. To handle these issues trust management techniques are to be used for proper cooperation of the nodes during routing process. newline newlineThe main goal of this thesis is to provide detection and prevention policies for two different harmful attacks i.e. wormhole attack and jellyfish attack in the network zone area to take care of trust and security issues. The techniques used in this thesis are delay per hop technique (DELPHI) and Direct trust based technique (DTD) for error free and attack free environment creation in the ad hoc networks. Thesetechniquesarecomparedaltogetherand analyzedthat,through whichpossible way attacks can be fully detected and prevented through the ad hoc networks. Forthe simulation part we have used NS-2 simulator for the best pictorial graphs way out. newlineKeywords: MANET, Security, Trust management, Intrusion Detection and Prevention, Attacks, wormhole Attack, Jellyfish attack, DELPHI technique, DTD technique etc. newline newline newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleAn Integrated Approach For Detecting And Preventing Mobile Ad Hoc Networks MANET From Wormhole Attack And Jellyfish Attack
dc.title.alternative
dc.creator.researcherThapar,Shruti
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordInstruments and Instrumentation
dc.description.note
dc.contributor.guideSharma,Sudhir Kumar
dc.publisher.placeJaipur
dc.publisher.universityJaipur National University
dc.publisher.institutionelectronics and communication engineering
dc.date.registered2018
dc.date.completed2024
dc.date.awarded2024
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:electronics and communication engineering

Files in This Item:
File Description SizeFormat 
2. prelim pages.pdfAttached File805.33 kBAdobe PDFView/Open
3. contents.pdf110.78 kBAdobe PDFView/Open
4. abstract.pdf26.13 kBAdobe PDFView/Open
80_recommendation.pdf42.12 kBAdobe PDFView/Open
90_plagiarism_report.pdf53.74 kBAdobe PDFView/Open
annexures.pdf159.52 kBAdobe PDFView/Open
chapter 1.pdf179.86 kBAdobe PDFView/Open
chapter 2.pdf355.91 kBAdobe PDFView/Open
chapter 3.pdf194.8 kBAdobe PDFView/Open
chapter 4.pdf169.24 kBAdobe PDFView/Open
chapter 5.pdf1.41 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).

Altmetric Badge: