Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/7065
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | S, Kanthimathi | |
dc.date.accessioned | 2024-12-14T15:16:25Z | |
dc.date.available | 2024-12-14T15:16:25Z | |
dc.date.issued | 2022-05 | |
dc.identifier.citation | CMR Institute of Technology. Bangalore | en_US |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/7065 | |
dc.identifier.uri | https://shodhganga.inflibnet.ac.in:8443/jspui/handle/10603/453563 | |
dc.description.abstract | There has been an enormous and irreversible shift towards wireless networks in the past ten years. Wireless Adhoc Network is one of the most noteworthy applications among wireless communications. Unlike conventional mobile wireless networks, ad hoc networks are not backed by fixed infrastructure. Instead, each host in the network acts as a router to keep them associated. Self- configuration nature of Adhoc nodes is exploited in military and emergency rescue applications. This unique characteristic of wireless Adhoc networks makes them very appealing to packet-dropping attacks. The proposed research categorizes the packet dropping attacks into three cases: Malicious node attacks, Link spoofing attacks, and Congestion attacks. All three cases are addressed separately, and suitable solutions are proposed for each. To deal with the attacks caused by malicious nodes, an effective solution to detect and prevent the malicious nodes in the network using the Cluster-Based Trust Entropy Method is proposed. Secondly, a Modified AODV with Stochastic Gradient Descent – Deep Learning Neural Network (SGD-DLNN) and Levy Flight – Black Widow Optimization is proposed to deal with congestion attacks. Third, to have lossless packet transmission in the presence of link spoofed message attacks, Elliptic Curve Cryptography Based AODV with enhanced Ant Colony Optimization is proposed. Implementation of proposed algorithms is done in the NS-2 simulator, and performance is evaluated concerning packet delivery ratio, throughput, delay, and routing overhead in the presence and absence of attacks. Moreover, the results significantly improve the network’s overall performance with the proposed approach in all three cases. In addition to the detection, machine learning algorithms are explored to get more accuracy in classifying malicious nodes by trust entropy values. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Visvesvaraya Technological University, Belagavi | en_US |
dc.subject | Computer Science / Information Science | en_US |
dc.title | Ensuring security against packet dropping Attacks in wireless adhoc networks | en_US |
dc.title.alternative | Computer Science / Information Science | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | FACULTY PH.D. THESIS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Ensuring security against packet dropping Attacks in wireless adhoc networks.pdf | 553.35 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.