Investigation of malicious nodes by securityimprovisation of routing in mobile ad hoc networks;
Institution: | Anna University |
---|---|
Department: | |
Year: | 2015 |
Keywords: | Dempster Shafer Theory; Information and communication engineering; Malicious Node Detection; Mobile Ad hoc Networks; Trade model; Trusted path routing protocol; Zero Knowledge Protocol |
Posted: | 02/05/2017 |
Record ID: | 2117935 |
Full text PDF: | http://shodhganga.inflibnet.ac.in/handle/10603/50225 |
Since last two decades Mobile Ad hoc Networks MANETs has been extensively studied and have attracted the attention of researchers because of their ease of deployment giving rise to many new exciting applications MANET is a collection of self organizing peer to peer mobile nodes with dynamic topologies forming a multi hop networks with no fixed infrastructure composed of tens to hundred mobile nodes equipped with wireless communication devices The unique characteristic of MANETs is preferred to be used in many novel situations It can be deployed in emergency rescue operation military tactics anti terrorism operations disaster struck areas to allow firefighters paramedics for the security of people to communicate with each other and to coordinate the relief effort The mobile nodes are prone to open access The wireless nature of communication and lack of central administration make MANETs more vulnerable to security attacks Hence securing the diverse set of MANET application to provide various levels of security guarantees is necessary for the successful deployment and usage Advisors/Committee Members: Sridharan D.