Cargando…

Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kumar, C. Sathiya (Autor)
Otros Autores: Duraiswamy, K.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Anchor Academic Publishing, 2018.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET; ABSTRACT; TABLE OF CONTENTS; CHAPTER 1 INTRODUCTION; 1.1 BACKGROUND; 1.2 STATEMENT OF THE PROBLEM; 1.3 SECURITY IN MANET; 1.3.1 Attacks in MANET; 1.3.2 Denial of Service Attack; 1.3.3 Channel Aware Detection; 1.4 NODE CLUSTERING IN MANET; 1.5 PURPOSE OF THE STUDY; 1.6 ORGANIZATION OF CHAPTERS; CHAPTER 2 LITERATURE REVIEW; 2.1 INTRODUCTION; 2.2 A SECURE KEY MODEL FOR EFFICIENT NODECLUSTERING BASED ON REPUTATION AND RANKING; 2.3 A HYBRID APPROACH FOR NODE CO-OPERATIONBASED CLUSTERING IN MANET
  • 2.4 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS
  • A DEGREE OF SEPARATION2.5 RESEARCH GAP; 2.6 OBJECTIVES OF THE RESEARCH; 2.7 CONTRIBUTIONS OF RESEARCH; CHAPTER 3 SECURE KEY MODEL WITH REPUTATION ANDRANKING SYSTEM IN MANET; 3.1 INTRODUCTION; 3.2 SECURITY ISSUES IN MANET; 3.2.1 Reputation Based Self Re-Organized Node Clustering; 3.3 SECURE KEY MODEL ON NODE CLUSTERING USINGREPUTATION AND RANKING; 3.4 NODE CLUSTERING BASED ON REPUTATION ANDRANKING; 3.5 GROUP KEY MANAGEMENT; 3.5.1 Need For Group Key Management; 3.6 PSEUDO CODE FOR SECURE KEY MODEL; 3.7 EXPERIMENTAL EVALUATION
  • 3.8 RESULTS AND DISCUSSION3.8.1 Malicious Node Detection Efficiency; 3.8.2 Node Reputation; 3.8.3 Performance Rate; 3.8.4 Computational Cost; 3.9 SUMMARY; CHAPTER 4 A HYBRID APPROACH FOR NODE CO-OPERATIONBASED CLUSTERING IN MANET; 4.1 INTRODUCTION; 4.2 NEED FOR NODE CO-OPERATION BASED CLUSTERINGIN MANET; 4.2.1 Challenges of Node Cooperation in MANET; 4.3 HYBRIDIZATION OF NODE CO-OPERATION BASEDCLUSTERING; 4.3.1 Evaluation of Weightage of Node Cooperativeness; 4.3.2 Process of Self-organization and Node Clustering Based onCooperativeness
  • 4.3.3 Clustering Based on Weightage and Self Organization of Nodes4.3.4 Node Clustering using HANCC; 4.3.5 Algorithm for HANCC; 4.4 EXPERIMENTAL EVALUATION; 4.5 RESULTS AND DISCUSSIONS; 4.5.1 Node Cooperativeness; 4.5.2 Clustering Energy Dissipation; 4.5.3 Network Lifetime; 4.6 SUMMARY; CHAPTER 5 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS TECHNIQUE; 5.1 INTRODUCTION; 5.2 VULNERABILITIES OF THE MOBILE AD HOCNETWORKS; 5.2.1 Lack of Secure Boundaries; 5.2.2 Threats from Jeopardize Nodes Inside the Network; 5.2.3 Lack of Centralized Management Facility
  • 5.2.4 Restricted Power Supply5.2.5 Scalability; 5.3 ACHIEVING COOPERATION AMONG NODES; 5.4 ENHANCING SECURITY OVER MANET; 5.5 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS TECHNIQUE; 5.5.1 Algorithmic Flow of ENCS Mechanism; 5.6 PERFORMANCE EVALUATION; 5.7 RESULTS AND DISCUSSION; 5.7.1 Average Information Leakage; 5.7.2 Packet Transmission Efficiency; 5.7.3 Security Level; 5.7.4 Average Cost; 5.8 SUMMARY; CHAPTER 6 PACKET RESERVING AND CLOGGINGCONTROL VIA ROUTING AWARE PACKETRESERVING FRAMEWORK IN MANET; 6.1 INTRODUCTION