Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4054
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGhada, Vaseem-
dc.date.accessioned2013-11-26T09:41:49Z-
dc.date.available2013-11-26T09:41:49Z-
dc.date.issued2013-06-01-
dc.identifier.urihttp://10.1.7.181:1900/jspui/123456789/4054-
dc.description.abstractAn Ad Hoc network is the network of self-con_guring nodes without having _xed infrastructure. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as sel_sh nodes, they use network and its service but dont cooperate with other nodes so as to save resources for themselves. This report discusses the types of availability attack, malicious activity of sel_sh node, a Survey of techniques used to detect sel_shness attack and some approach to detect sel_shness attack. Here i have implemented the sel_shness attack and analyze its e_ect on the Packet delivery ratio, latency, throughput. I have also implemented and designed the credit based algorithm to detect and overcome the activity of sel_sh nodes. I have checked the e_ect of mobility and number of active connection on the PDR, Throughput and Delay.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries11MICT05en_US
dc.subjectComputer 2011en_US
dc.subjectProject Report 2011en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject11MICTen_US
dc.subject11MICT05en_US
dc.subjectICTen_US
dc.subjectICT 2011en_US
dc.subjectCE (ICT)en_US
dc.titleEnforcing Reliable Routing in Ad-Hoc Networksen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (ICT)

Files in This Item:
File Description SizeFormat 
11MICT05.pdf11MICT05501.52 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.