AbstractsComputer Science

Investigation of malicious nodes by securityimprovisation of routing in mobile ad hoc networks;

by pari S Neelavathy




Institution: Anna University
Department:
Year: 2015
Keywords: Dempster Shafer Theory; Information and communication engineering; Malicious Node Detection; Mobile Ad hoc Networks; Trade model; Trusted path routing protocol; Zero Knowledge Protocol
Posted: 02/05/2017
Record ID: 2117935
Full text PDF: http://shodhganga.inflibnet.ac.in/handle/10603/50225


Abstract

Since last two decades Mobile Ad hoc Networks MANETs has been extensively studied and have attracted the attention of researchers because of their ease of deployment giving rise to many new exciting applications MANET is a collection of self organizing peer to peer mobile nodes with dynamic topologies forming a multi hop networks with no fixed infrastructure composed of tens to hundred mobile nodes equipped with wireless communication devices The unique characteristic of MANETs is preferred to be used in many novel situations It can be deployed in emergency rescue operation military tactics anti terrorism operations disaster struck areas to allow firefighters paramedics for the security of people to communicate with each other and to coordinate the relief effort The mobile nodes are prone to open access The wireless nature of communication and lack of central administration make MANETs more vulnerable to security attacks Hence securing the diverse set of MANET application to provide various levels of security guarantees is necessary for the successful deployment and usage Advisors/Committee Members: Sridharan D.