Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/5839
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Marakna, Kajol Kantilal | - |
dc.date.accessioned | 2015-07-25T05:37:33Z | - |
dc.date.available | 2015-07-25T05:37:33Z | - |
dc.date.issued | 2015-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5839 | - |
dc.description.abstract | Applications related to peer to peer le transfers are used widely in wireless network. However, le transfer in wireless network is di cult due to some characteristics of wire- less network like unreliable channel, insecure transmissions, node movement etc. Delay Tolerant Network(DTN) can be used to solve issues related to such applications. It has already been proved that opportunistic networking improves e ciency of peer to peer le sharing systems. Previous research works show that network coding can help when network is built arbitrarily. Hence, peer to peer application are best place to apply it. Peer to peer le transfers are performed using end hosts. Thus they have a very good capacity of encoding and decoding. In past, researchers have proved that peer to peer le sharing system based on network coding or its variant over DTN can be built to improve the quality of le transfer applications. We have carried out this project in two phases. The rst phase includes literature survey for security issues which dwells in delay tolerant network, network coding and peer to peer le sharing system based on network coding. It describes there are many possible attacks in DTN which results into inherent presence of them in peer to peer le sharing system for DTN. The researchers have explored pollution attack, packet drop attacks and its defense schemes as their major concern of their research compared to other possible attacks. The comparison of di erent defense schemes for pollution attack is elaborated in this thesis. We have shown aws in each scheme and those schemes which can overcome these aws. Based on this survey, we have proposed one algorithm which provides defense scheme against pollution attack. Second phase of our thesis shows implementation of proposed work. Following to it, comparison of our proposed scheme with that of the existing one has been shown. Thus our approach has stood out to be a good defense scheme against pollution attack and packet drop attack. The same can be adopted for future work as that enlisted later. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 13MCEI10; | - |
dc.subject | Computer 2013 | en_US |
dc.subject | Project Report 2013 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 13MCEI | en_US |
dc.subject | 13MCEI10 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2013 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Improving security in P2P File Sharing based on Network Coding for DTN | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
13MCEI10.pdf | 13MCEI10 | 758.57 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.