Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7985
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGoel, Ratish-
dc.contributor.authorSharma, Ankur-
dc.contributor.authorWeezer, Tashi-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-10-20T09:04:28Z-
dc.date.available2022-10-20T09:04:28Z-
dc.date.issued2011-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7985-
dc.description.abstractOur key issue will be to detection of Sybil attack in a MANET (Mobile Ad hoc Network). Out of many detection methods and techniques that exist, we will emphasis on detection by neighboring information. It states that no two neighbors in a highly populated area will have same set of neighbors in their vicinity and this is true in even real life scenario. Identifying the set of common neighbors will help us detect which are Sybil nodes and malicious node and thus be sure that rest of the nodes are normal nodes through which we can safely send our message to destination of our choice without any security risks like eavesdropping or manipulation of vital information in the message.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSybil attacken_US
dc.subjectMobile Adhoc Networken_US
dc.titleDetection of Sybil Attack in a Mobile Ad Hoc Network (Manet)en_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Detection of Sybil Attack in a Mobile Ad Hoc Network (Manet).pdf1.11 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.