Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7985
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Goel, Ratish | - |
dc.contributor.author | Sharma, Ankur | - |
dc.contributor.author | Weezer, Tashi | - |
dc.contributor.author | Vasudeva, Amol [Guided by] | - |
dc.date.accessioned | 2022-10-20T09:04:28Z | - |
dc.date.available | 2022-10-20T09:04:28Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7985 | - |
dc.description.abstract | Our key issue will be to detection of Sybil attack in a MANET (Mobile Ad hoc Network). Out of many detection methods and techniques that exist, we will emphasis on detection by neighboring information. It states that no two neighbors in a highly populated area will have same set of neighbors in their vicinity and this is true in even real life scenario. Identifying the set of common neighbors will help us detect which are Sybil nodes and malicious node and thus be sure that rest of the nodes are normal nodes through which we can safely send our message to destination of our choice without any security risks like eavesdropping or manipulation of vital information in the message. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Sybil attack | en_US |
dc.subject | Mobile Adhoc Network | en_US |
dc.title | Detection of Sybil Attack in a Mobile Ad Hoc Network (Manet) | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Detection of Sybil Attack in a Mobile Ad Hoc Network (Manet).pdf | 1.11 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.