Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/6610
Full metadata record
DC FieldValueLanguage
dc.contributor.authorReddy, K. Praneeth-
dc.date.accessioned2014-11-03T10:10:29Z-
dc.date.available2014-11-03T10:10:29Z-
dc.date.issued2012-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/6610-
dc.guideKumar, Padam-
dc.description.abstractIn recent years the widespread availability of wireless communications, mobile computing and handheld devices has led to the growth and significance of wireless mobile ad hoc networks. The ability to establish communication without an infrastructure not with any kind ofcentral authority at very low cost and the capacity to communicate beyond the node's wireless transmission range embarks Mobile Ad hoc Networks (MANET) as the deployment ground for various fields such as wireless sensor networks, ubiquitous networks and peer-to-peer networks. Multicasting is very effective means of transmission in many applications of wireless networks by reducing transmission costs to a big extend. Security issues are paramount in such networks. Nodes in MANETs may launch various attacks or may become selfish to save their resources. These nodes can be termed as malicious. Mitigating the effects of such malicious nodes is critical to success of MANETs. Detecting malicious nodes in an open ad hoc network is more complicated than in traditional wired networks. Also, MANETs have several operational constraints like bandwidth, battery power, CPU, memory, signal strength, etc. Considering all these factors, developing a technique for detection of malicious nodes in MANETs is very challenging. A variety of techniques have been proposed but all of them have their limitations. The security issues in group communication are even more challenging. Here, we present a new dynamic trust mechanism for detection of malicious nodes. This technique detects and subsequently avoid the Black hole and Grey hole attacks. A node is blacklisted if its trust value falls below the threshold. This trust value is updated at regular intervals and hence it is dynamic. The proposed solution is tested by simulating it in QualNet. The results show that the solution works well and is able to find all the malicious nodes which contribute to the packet dropping misbehaviouren_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectSECURE MULTICAST ROUTINGen_US
dc.subjectMANETSen_US
dc.subjectMITIGATING PACKET DROPPING MISBEHAVIOURen_US
dc.titleSECURE MULTICAST ROUTING IN MANETS BY MITIGATING PACKET DROPPING MISBEHAVIOURen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG21466en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECED G21466.pdf3.53 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.