Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7647
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVyas, Pulkita-
dc.contributor.authorParashar, Akansha-
dc.contributor.authorShukla, Shailendra [Guided by]-
dc.date.accessioned2022-10-11T10:16:05Z-
dc.date.available2022-10-11T10:16:05Z-
dc.date.issued2016-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7647-
dc.description.abstractTrust Analysis in Ad - Hoc Networks allows the nodes to detect the nodes which are not secure for the transferring of the data packets. We aim to present a prototype system for real time tracking of a packet. The system uses a simple routing algorithm for the movement of packet. The general requirements of a real time routing algorithm are that it should be computationally inexpensive and it should possess the ability to perform in different environments. This algorithm should be able to start and initialize itself with minimum knowledge about the environment. The objective of this project is to calculate trust value of each node without knowing the infrastructure of the network. Ad hoc networks form quickly and this makes them indispensible in today’s era. This algorithm can be used to secure the Vehicular Ad – Hoc Networks, Smart Phone Ad – Hoc Networks and many more.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectTrust factoren_US
dc.subjectAd Hoc networksen_US
dc.titleTrust Factor Analysis in AD HOC Networksen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Trust Factor Analysis in AD HOC Networks.pdf1.73 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.