Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/7955
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Engineering | en_US |
dc.date.accessioned | 2013-04-04T11:12:31Z | - |
dc.date.available | 2013-04-04T11:12:31Z | - |
dc.date.issued | 2013-04-04 | - |
dc.identifier.uri | http://hdl.handle.net/10603/7955 | - |
dc.description.abstract | The security issues are more complex and challenging in Mobile Ad hoc Networks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence of centralized routers and routing through intermediate nodes. For successful communication between a pair of source and destination it is vital that the intermediate nodes be trustworthy and don t drop packets. Nodes in an ad hoc network may not be trustworthy either due to selfishness created by power loss or due to maliciousness relating to rogue intentions. A node that was earlier trust worthy may no longer be so at later stages due to loss of power making the continuous dynamic evaluation of trust a necessity. Also the security requirements may vary as per the conditions on the scenario. This thesis proposes an intelligent protocol that takes care of both selfishness and maliciousness. The protocol provides a kick start to the system on the initial basis for the purpose of trust worthiness, evaluates the trust dynamically, takes into consideration the trust worthiness of the node supplying the second hand trust information and is able to adapt to various levels of security requirements. The proposed protocol is able to overcome the basic drawbacks of conventional trust based systems such as it takes time for the trust index to grow to a requisite level before a node can be selected as the intermediate node with confidence, it is quite possible that a node which was earlier trustworthy may no longer be so as it may become selfish due to its energy loss with the passage of time, a node supplying the second hand trust information may itself be not reliable and the threshold trust index requirement may be different for the different application scenarios. newlineThe proposed protocol is a modification of basic AODV protocol and has been named as AODV-n. The value of n can be 0,1,2,3 depending upon the security level requirements, 0 being the least secure and 3 being the most secure one. | en_US |
dc.format.extent | 138p. | en_US |
dc.language | English | en_US |
dc.relation | - | en_US |
dc.rights | university | en_US |
dc.title | Design of an intelligent protocol for security challenges in mobile ad-hoc network | en_US |
dc.title.alternative | - | en_US |
dc.creator.researcher | Gupta, Shailender | en_US |
dc.subject.keyword | Computer Science | en_US |
dc.subject.keyword | intelligent protocol | en_US |
dc.subject.keyword | mobile ad-hoc network | en_US |
dc.description.note | References p.124-138 | en_US |
dc.contributor.guide | Nagpal, C K | en_US |
dc.publisher.place | Rohtak | en_US |
dc.publisher.university | Maharshi Dayanand University | en_US |
dc.publisher.institution | Department of Computer Science | en_US |
dc.date.registered | n.d. | en_US |
dc.date.completed | 2012 | en_US |
dc.date.awarded | n.d. | en_US |
dc.format.dimensions | - | en_US |
dc.format.accompanyingmaterial | None | en_US |
dc.type.degree | Ph.D. | en_US |
dc.source.inflibnet | INFLIBNET | en_US |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 26.76 kB | Adobe PDF | View/Open |
02_certificate.pdf | 51.03 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 46.85 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 13.06 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 36.34 kB | Adobe PDF | View/Open | |
06_summary.pdf | 123.27 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 123.36 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 167.31 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 140.11 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 609.4 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 164.73 kB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 254 kB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 37.31 kB | Adobe PDF | View/Open | |
15_bibliography.pdf | 135.03 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: