Type of Material: | Thesis |
Title: | Security Transactions in Ad Hoc Networks For IDC Based Protocol |
Researcher: | VIJAYARAGAVAN, S P |
Guide: | KRISHNA KUMAR, T |
Department: | Department of Electronics and Communication Engineering |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2017 |
Language: | English |
Subject: | Engineering | Engineering and Technology | Engineering Electrical and Electronic | Electrical Engineering | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2017; D13EC006 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454861 | |
003 | IN-AhILN | |
005 | 2024-09-19 14:34:00 | |
008 | __ | 240919t2017||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454861 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aVIJAYARAGAVAN, S P|eResearcher |
110 | __ | |aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aSecurity Transactions in Ad Hoc Networks For IDC Based Protocol |
260 | __ | |aChennai|bBharath University, Chennai|c2017 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2017|oD13EC006 |
520 | __ | |aIn this report, complete secured protocol implemented in AD Hoc Networks is well defined with little user intervention. No Infrastructure and Central Authority control is required. Each node is identified uniquely with IDC and LID after authentication process that verifies the integrity of the data. Encrypted form of IDC evaluates Digital Signatures and is certified by Distributed Authority. Network is self configured based up on the physical and logical parameters provided and network begins with the first node and is widespread by attaching forth coming nodes as neighbour nodes in the network, thereby achieves scalability. Joining Node with configured network and Communication between the nodes is done only based on trust and authentication. Thus reliable and secure communication is enabled. Data services can be offered to the authenticated neighbouring nodes without flooding and is avoided by allowing each individual node to choose a path to reach the destination. Thereby reduces network traffic and save |
650 | __ | |aElectrical Engineering|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aEngineering |
653 | __ | |aEngineering and Technology |
653 | __ | |aEngineering Electrical and Electronic |
700 | __ | |aKRISHNA KUMAR, T|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/321501|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.