Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7355
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, Rupali-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-10-07T06:55:36Z-
dc.date.available2022-10-07T06:55:36Z-
dc.date.issued2016-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7355-
dc.description.abstractA Mobile ad-hoc network is a self-configuring network that does not depend on any infrastructure for communication. Every node is free to move anywhere in the network and data is exchanged independently across the network. Network security in an MANET is a very challenging issue. Open nature communication of MANET makes it more vulnerable to security attacks. Our major focus in the project will be impersonation of Sybil Attack, in which a malicious node illegitimately claims multiple identities. This attack can disrupt various operations of the mobile ad hoc networks for Example, voting, fair resource allocation scheme, Detection and routing mechanisms etc. In addition to these the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSybil attacken_US
dc.subjectAd Hoc networksen_US
dc.titleImpersonation Based Sybil attack to Disrupt the Lowest ID Clustering algorithm in Mobile AD HOC Networksen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.