Title : Security Transactions in Ad Hoc Networks For IDC Based Protocol

Type of Material: Thesis
Title: Security Transactions in Ad Hoc Networks For IDC Based Protocol
Researcher: VIJAYARAGAVAN, S P
Guide: KRISHNA KUMAR, T
Department: Department of Electronics and Communication Engineering
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2017
Language: English
Subject: Engineering
Engineering and Technology
Engineering Electrical and Electronic
Electrical Engineering
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2017; D13EC006
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454861
003IN-AhILN
0052024-09-19 14:34:00
008__240919t2017||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454861
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aVIJAYARAGAVAN, S P|eResearcher
110__|aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aSecurity Transactions in Ad Hoc Networks For IDC Based Protocol
260__|aChennai|bBharath University, Chennai|c2017
300__|dDVD
502__|bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2017|oD13EC006
520__|aIn this report, complete secured protocol implemented in AD Hoc Networks is well defined with little user intervention. No Infrastructure and Central Authority control is required. Each node is identified uniquely with IDC and LID after authentication process that verifies the integrity of the data. Encrypted form of IDC evaluates Digital Signatures and is certified by Distributed Authority. Network is self configured based up on the physical and logical parameters provided and network begins with the first node and is widespread by attaching forth coming nodes as neighbour nodes in the network, thereby achieves scalability. Joining Node with configured network and Communication between the nodes is done only based on trust and authentication. Thus reliable and secure communication is enabled. Data services can be offered to the authenticated neighbouring nodes without flooding and is avoided by allowing each individual node to choose a path to reach the destination. Thereby reduces network traffic and save
650__|aElectrical Engineering|2UGC
650__|aEngineering and Technology|2AIU
653__|aEngineering
653__|aEngineering and Technology
653__|aEngineering Electrical and Electronic
700__|aKRISHNA KUMAR, T|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/321501|yShodhganga
905__|afromsg

User Feedback Comes Under This section.