Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6982
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChhabra, Hardik-
dc.contributor.authorSehgal, Nishant-
dc.contributor.authorVerma, Ruchi [Guided by]-
dc.date.accessioned2022-09-29T05:50:41Z-
dc.date.available2022-09-29T05:50:41Z-
dc.date.issued2019-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6982-
dc.description.abstractIOT is the internet of things where various small utility based networks interconnects to each other. So that they can share the data amongst each other. Because small IOT based network for its network utility share the data to the remote network. This way the network can have vulnerability to various types of attacks. While there is a attack situation the network performance will be downgraded. Trust based scheme has been used for detection of the DDOS. This technique will be based on self cooperation between the nodes. where each node mark the trust value of the other node. Only trusted nodes will be marked as intermediate node. In result no malicious node can be the part of the network. The performance can be enhanced using the trust based technique. This performance has been measured under two different parameters like end to end delay and the throughputen_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectInternet of Thingsen_US
dc.subjectDDOS attacken_US
dc.titleIdentification and Removal of DDOS Attack in IoTen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Identification and Removal of DDOS Attack in IoT.pdf1.65 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.