- Due to wireless nature, the malicious nodes can easily gain access with the wireless links
- Once the malicious node gain the access, they can interrupt the data communication
- The malicious nodes can overhear / overwrite / manipulate / drop the packets
- These malicious nodes degrades the network performance.
- In order to detect malicious nodes, we have proposed an ID-based light-weight cryptographic protocol using authentication technique.
- This is light-weight mechanism, which means no complex calculations are required.
- The proposed technique works on the cryptographic one-way hash function and doesn’t include any cryptographic high computation operations like pairing as well as exponentiation.
- In this method, some random nodes are assumed as Temporary servers.
- Each node in the network possess an unique ID
- The sender node generates a key pair and send the data to Temporary server.
- This server verifies the sender authenticity and transmit the data to receiver.
- If the authenticity is not valid, then the sender node would be marked as MALICIOUS .
- In order to segregate attackers from participating in network activities in future, we are proposing a CERTIFICATE REVOCATION method.
- According to this, the network is divided into different clusters and CH nodes are elected.
- These CH nodes keep maintaining of the Certificates / keys of each its member nodes.
- if any node found as MALICIOUS, then the node’s certificate would be immediately revoked.
- without a valid certificate / keys, the malicious nodes cannot communicate with the network in future.
A cluster-based certificate revocation scheme is able to revoke malicious nodes certificate quickly on the basis of only one vote from the neighbor. In this system, CA maintains two different lists, warning list and black list, to keep track on the malicious nodes so as such nodes cannot take part in certificate revocation.
System: Pentium IV 2.4 GHz.
Hard Disk: 50 GB.
Floppy Drive: 1.44 Mb.
Monitor: 18 VGA Color.
Ram: 2048 Mb.
Operating system: Ubuntu 14.04/Red Hat Linux9/Linux Mint
Coding Language: otcl, c++
Download This Improving Robustness in AD-HOC Network by Detecting Malicious Node NS2 project Code
In the Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NS2 Project encryption done using Attribute-based encryption. Previously we are using RSA algorithm for encryption.
In the given Ns2 project there are lots of CPP programs. Even if removed also working without any change. I removed All cpp files.
The graphs are generated based on the .xg files. The worst thing is the values are not changing. They are just constants.
In the base paper the project should contain battle forces and region but in the project, we have only one user that does not belong to any region and battle force.
The key values are generated three times but they are not at all used anywhere for the ENCRYPTION AND DECRYPTION purpose to run the project we need DSR or AODV protocols but they are not using anywhere.
The main problem is the advantages of the project like key revocation, Forward, and backward Secrecy are not at all discussed. SO whats the main purpose of this project?
We need a database in the project to show the forward and backward secrecy. But no database used in this project.
We need central key authority and Local key authority but only one key authority used.
The path is not showing for the Sending encryption and decryption message. Just used that 1 node send it 2 And 2 send it to 3 like that. Sending msg should do using routing algorithm but here just used a FOR loop and displayed at the bottom.
Welcome to Latest NS2 Projects Section, Here We have developed the Latest 2016 journal Papers on different domains like networking, network security, Wireless Sensor Networks, Wireless Ad Hoc Networks, MANET, etc. Even you can find the best 2015, 2014 NS2 Titles below:
2016 Journal Papers
- Mitigating the dropping attacks by support of node privacy in wireless ad hoc networks
- Discriminate the collusion attacks by suing data aggregation in wireless sensor networks
- To mitigate the trust fluctuations in unattended wireless sensor networks by support of trust management
- Discriminating the attacks by using data aggregation technique secure way in wireless sensor networks
- Efficient data access in delay tolerant networks by support of cache secure data
- Secure data discovery in wireless sensor networks with efficiency
- Improve the performance of cluster based networks for secure data transmission
- Secure routing in delay tolerant networks by using dynamic trust management system
- Efficient data access in wireless sensor network by using trust with authority
- Host based intrusion detection system and cooperative mechanism for mitigating the accuracy in virtual network systems
- Mitigate the energy consumption in dynamic wireless sensor networks using mathematical model
- Performance of network lifetime using energy balanced routing method in WSN
- Improve the performance of network based on packet generation
- Improve the lifetime of network by the affect of mitigating the hop count
2015 Journal Papers
- Privacy preserving and truthful detection of packet ropping attacks in wireless ad hoc networks
- A secure distributed data discovery and dissemination in wsns
- Secure and efficient data transmission for cluster based wireless networks
- An efficient distributed trust model for wsns
- Effective key management in dynamic wireless sensor networks
- Impact of limiting hop count on the lifetime of wireless sensor networks
- Defending against collaborative attacks by malicious nodes in manets: a cooperative bait detection approach
- Design and simulation of enhanced MODLEACH for wsn
- An algorithm to detect malicious nodes in wireless sensor network using Enhanced MODLEACH
- An enhanced cluster-head selection scheme for distributed heterogeneous wireless sensor network
2014 Journal Papers
- Secure data aggregation technique for wireless sensor network in the presence of collusion attacks
- Secure data aggregation in wireless sensor networks: filtering out the attackers impact
- Cooperative caching for efficient data access in disruption tolerant networks
- Dynamic trust management for delay tolerant networks and its application to secure routing
- An energy balanced routing method based on forward-aware factor for wsns
- Automatic test packet generation
- Randomized multipath routing in wsns
- Using identity and trust based management for MANET
NS2 (Network Simulator-2 Training) Course Content:
Routing Protocols: 1
Type of Networks: 1
Wired Network: 1
Wireless Network: 2
Wireless Sensor Network: 2
Apply New Features: 2
- NS2 Introduction
- NS2 Architecture
- NS2 Components
- NS2 Installation
- Installation of supporting software
- Linux Basics
- Exploring example scripts
- TCL basic commands
- OTCL Programming
- Simulation Trace Analysis using Perl/Awk etc
- Plotting graphs with XGraph
- Proactive protocols (DSDV, OLSR,..)
- Reactive Protocols (AODV, DSR,…).
- Hybrid Protocols (ZRP, etc…..).
Type of Networks:
- Deep explanation on wired networks
- Designing of different topologies
Ex: Ring, Star, Dumbbell Topologies
- Setting and configuration of Parameters for wireless networks
- Designing different Wireless Topologies (MANET,VANET)
- Trace file Analysis using PERL/AWK
- Plotting graphs for simple Wireless Networks and Ad hoc Networks
Wireless Sensor Network:
- Applications of Wireless Sensor Networks
Apply New Features:
- Patching NS2 for unsupported features
- Linkage between C++ and Otcl.
- Perl/awk for trace files analysis
Contact Us for More details
Welcome to the NS2 Projects Section. Here all 2014 Network Simulator NS2 Projects are available with Source code, Documentation and Execution/Explanation Support. Find the below List of Academic 2014-15 NS2 Projects.
||Black Hole Attack in Mobile Ad Hoc Networks
||An Efficient Secure AODV Routing Protocol in MANET
||Trust Improvement among the nodes in a Wireless Adhoc`
||Intrusion Detection in Wireless Sensor Networks
||Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
||ALBA-R-Load-Balancing-Geographic-Routing Around onnectivity-Holes-in-Wireless-Sensor-Networks
||Wireless Sensor Network LEACH Protocol
||Trust Management for Effective Collaborative Intrusion Detection Networks(Dirichlet)
||Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
||A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
||Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network
||Privacy preserving Data Aggregation in WSN
||Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs
||Delay Analysis in Mobile Adhoc Networks
||Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
||Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
||Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
||Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
||Parallel and Distributed Systems
||Secure Continuous Aggregation in Wireless Sensor Networks
||Parallel and Distributed Systems
||Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
||Parallel and Distributed Systems
||ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
||Parallel and Distributed Systems
||A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
||Distributed Cooperative Caching in Social Wireless Networks
||EAACK—A Secure Intrusion-Detection System for MANETs
||Maximal Scheduling in Wireless Ad Hoc Networks With Hypergraph Interference Models
||Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network
||DSDMAC: Dual Sensing Directional MAC Protocol
for Ad Hoc Networks with Directional Antennas
||A Highly Effective and Efficient Route Discovery & maintenance in DSR
||AODV Routing Implementation for Scalable Wireless Ad-Hoc Network Simulation (SWANS)
||A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
||On the Node Clone Detection in Wireless Sensor Networks
||Fast Retransmission Scheme for Overcoming Hidden Node
Problem in IEEE 802.11 Networks
||Operator-Friendly Traffic Engineering in IP/MPLS Core Networks
||The Three-Tier Security Scheme in Wireless
Sensor Networks with Mobile Sinks
|Parallel and Distributed Systems
||Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
||AODV-COD:AODV Routing Protocol with Coding
||NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
||An Efficient and Robust Addressing Protocol for Node Auto-configuration in Ad Hoc Networks
||IPv4 based Hierarchical Distributive Auto-Configuration Protocol for MANETs
Contact us for more details.