Secure QoS based Routing Protocol for Mobile Ad hoc Network

dc.contributor.guideGautam M. Borkar
dc.coverage.spatialEnhance Quality of service while applying security in routing protocol
dc.creator.researcherAnita Ram Patil
dc.date.accessioned2024-04-02T11:59:48Z
dc.date.available2024-04-02T11:59:48Z
dc.date.awarded2024
dc.date.completed2024
dc.date.registered2020
dc.description.abstractThe proposed work focuses on optimizing route selection and detecting link failures in order to ensure uninterrupted transmission of multimedia files between a source and destination node. Also, security is a crucial issue in MANET. Analysis study done for QoS provisioning and existing security measures in MANET routing algorithms. To find out about the different types of security attacks, breaches of security goals, and effects of attacks on MANET, a comparison study of QoS parameters and security-based routing protocols is carried out. In order to solve this problem, a secure routing mechanism is implemented known as the Public Key Selective Encryption algorithm. The Grey Wolf Optimization algorithm is employed to achieve global convergence and optimize the performance of the secure Ad-hoc on Demand Multi-Path Distance Vector algorithm. The Op-PKSEA algorithm is utilized to select the next hop node based on factors such as delay, number of forwarded packets, and network quality. The proposed Swarm Intelligence based Secure-AODV (SIS-AODV) algorithm utilizes swarm intelligence and lightweight cryptography to ensure security in ad hoc networks. It achieves this by implementing a secret key and hash mechanism, which effectively prevent the participation of malicious nodes in routing operations. The SIS-AODV algorithm examined the black-hole, byzantine, and gray-hole attacker nodes through the process of performance evaluation. The proposed Anamolies Detection (AD-AODV) scheme efficiently detects malicious behavior which prune for denial of service attack. The work focused on detection of malicious node using token based mechanism and node authentication while entering into network. To detect gray-hole and black-hole node a token-based approach used. Also legitimate node is identification using its trust level. This entire work based on the encryption techniques and soft computing approach to enhance the scope of the secure routing algorithms to maintain QoS and improve security measures. newline
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions3.1MB
dc.format.extent221
dc.identifier.urihttp://hdl.handle.net/10603/556409
dc.languageEnglish
dc.publisher.institutionSchool of Engineering
dc.publisher.placeNavi Mumbai
dc.publisher.universityPadmashree Dr. D.Y. Patil Vidyapeeth, Navi Mumbai
dc.relationhttps://doi.org/10.32908/ahswn.v57.10165 , https://doi.org/10.1049/wss2.12068, https://doi.org/10.1016/B978-0-323-91781-0.00016-8 , https://doi.org/10.5772/intechopen.102982
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordEngineering and Technology
dc.titleSecure QoS based Routing Protocol for Mobile Ad hoc Network
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 13
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
96.21 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelim pages.pdf
Size:
3.18 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_content.pdf
Size:
1.03 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstract.pdf
Size:
373.1 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter1.pdf
Size:
4.5 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: