Limit search to available items
Book Cover
E-book
Author Kumar, C. Sathiya, author

Title Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET / C. Sathiya Kumar, K. Duraiswamy
Published [Place of publication not identified] : Anchor Academic Publishing, 2018

Copies

Description 1 online resource
Contents Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET; ABSTRACT; TABLE OF CONTENTS; CHAPTER 1 INTRODUCTION; 1.1 BACKGROUND; 1.2 STATEMENT OF THE PROBLEM; 1.3 SECURITY IN MANET; 1.3.1 Attacks in MANET; 1.3.2 Denial of Service Attack; 1.3.3 Channel Aware Detection; 1.4 NODE CLUSTERING IN MANET; 1.5 PURPOSE OF THE STUDY; 1.6 ORGANIZATION OF CHAPTERS; CHAPTER 2 LITERATURE REVIEW; 2.1 INTRODUCTION; 2.2 A SECURE KEY MODEL FOR EFFICIENT NODECLUSTERING BASED ON REPUTATION AND RANKING; 2.3 A HYBRID APPROACH FOR NODE CO-OPERATIONBASED CLUSTERING IN MANET
2.4 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS -- A DEGREE OF SEPARATION2.5 RESEARCH GAP; 2.6 OBJECTIVES OF THE RESEARCH; 2.7 CONTRIBUTIONS OF RESEARCH; CHAPTER 3 SECURE KEY MODEL WITH REPUTATION ANDRANKING SYSTEM IN MANET; 3.1 INTRODUCTION; 3.2 SECURITY ISSUES IN MANET; 3.2.1 Reputation Based Self Re-Organized Node Clustering; 3.3 SECURE KEY MODEL ON NODE CLUSTERING USINGREPUTATION AND RANKING; 3.4 NODE CLUSTERING BASED ON REPUTATION ANDRANKING; 3.5 GROUP KEY MANAGEMENT; 3.5.1 Need For Group Key Management; 3.6 PSEUDO CODE FOR SECURE KEY MODEL; 3.7 EXPERIMENTAL EVALUATION
3.8 RESULTS AND DISCUSSION3.8.1 Malicious Node Detection Efficiency; 3.8.2 Node Reputation; 3.8.3 Performance Rate; 3.8.4 Computational Cost; 3.9 SUMMARY; CHAPTER 4 A HYBRID APPROACH FOR NODE CO-OPERATIONBASED CLUSTERING IN MANET; 4.1 INTRODUCTION; 4.2 NEED FOR NODE CO-OPERATION BASED CLUSTERINGIN MANET; 4.2.1 Challenges of Node Cooperation in MANET; 4.3 HYBRIDIZATION OF NODE CO-OPERATION BASEDCLUSTERING; 4.3.1 Evaluation of Weightage of Node Cooperativeness; 4.3.2 Process of Self-organization and Node Clustering Based onCooperativeness
4.3.3 Clustering Based on Weightage and Self Organization of Nodes4.3.4 Node Clustering using HANCC; 4.3.5 Algorithm for HANCC; 4.4 EXPERIMENTAL EVALUATION; 4.5 RESULTS AND DISCUSSIONS; 4.5.1 Node Cooperativeness; 4.5.2 Clustering Energy Dissipation; 4.5.3 Network Lifetime; 4.6 SUMMARY; CHAPTER 5 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS TECHNIQUE; 5.1 INTRODUCTION; 5.2 VULNERABILITIES OF THE MOBILE AD HOCNETWORKS; 5.2.1 Lack of Secure Boundaries; 5.2.2 Threats from Jeopardize Nodes Inside the Network; 5.2.3 Lack of Centralized Management Facility
5.2.4 Restricted Power Supply5.2.5 Scalability; 5.3 ACHIEVING COOPERATION AMONG NODES; 5.4 ENHANCING SECURITY OVER MANET; 5.5 EFFICIENT NODE COOPERATION AND SECURITY INMANET USING CLOSENESS TECHNIQUE; 5.5.1 Algorithmic Flow of ENCS Mechanism; 5.6 PERFORMANCE EVALUATION; 5.7 RESULTS AND DISCUSSION; 5.7.1 Average Information Leakage; 5.7.2 Packet Transmission Efficiency; 5.7.3 Security Level; 5.7.4 Average Cost; 5.8 SUMMARY; CHAPTER 6 PACKET RESERVING AND CLOGGINGCONTROL VIA ROUTING AWARE PACKETRESERVING FRAMEWORK IN MANET; 6.1 INTRODUCTION
Notes Online resource; title from PDF title page (EBSCO, viewed April 2, 2019)
Subject Ad hoc networks (Computer networks)
Computer networks -- Security measures.
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
Ad hoc networks (Computer networks)
Computer networks -- Security measures
Form Electronic book
Author Duraiswamy, K.
ISBN 9783960676850
3960676859