Improving Robustness in AD-HOC Network by Detecting Malicious Node

Existing System:

  1. Due to wireless nature, the malicious nodes can easily gain access with the wireless links
  1. Once the malicious node gain the access, they can interrupt the data communication
  1. The malicious nodes can overhear / overwrite /  manipulate / drop the packets
  1. These malicious nodes degrades the network performance.

Proposed System:

  1. In order to detect malicious nodes, we have proposed an ID-based light-weight cryptographic protocol using authentication technique.
  1. This is light-weight mechanism, which means no complex calculations are required.
  1. The proposed technique works on the cryptographic one-way hash function and doesn’t include any cryptographic high computation operations like pairing as well as exponentiation.
  1. In this method, some random nodes are assumed as Temporary servers.
  1. Each node in the network possess an unique ID
  1. The sender node generates a key pair and send the data to Temporary server.
  1. This server verifies the sender authenticity and transmit the data to receiver.
  1. If the authenticity is not valid, then the sender node would be marked as MALICIOUS .


  1. In order to segregate attackers from participating in network activities in future, we are proposing a CERTIFICATE REVOCATION method.
  1. According to this, the network is divided into different clusters and CH nodes are elected.
  1. These CH nodes keep maintaining of the Certificates  / keys of each its member nodes.
  1. if any node found as MALICIOUS, then the node’s certificate would be immediately revoked.
  1. without a valid certificate / keys, the malicious nodes cannot communicate with the network in future.

Simulation Results:

A cluster-based certificate revocation scheme is able to revoke malicious nodes certificate quickly on the basis of only one vote from the neighbor. In this system, CA maintains two different lists, warning list and black list, to keep track on the malicious nodes so as such nodes cannot take part in certificate revocation.


Fig: PDR

Fig: Drop

Fig: Throughout

Fig: Delay

Hardware Requirements:

System:    Pentium IV 2.4 GHz.

Hard Disk:     50 GB.

Floppy Drive:  1.44 Mb.

Monitor:         18 VGA Color.

Mouse:            Logitech.

Ram:              2048 Mb.

Software Requirements:

Operating system:    Ubuntu 14.04/Red Hat Linux9/Linux Mint

Coding Language:    otcl, c++

Tool:                        Ns-2.34/Ns-2.35 

 Download This Improving Robustness in AD-HOC Network by Detecting Malicious Node NS2 project Code

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NS2 Project

In the Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NS2 Project encryption done using Attribute-based encryption. Previously we are using RSA algorithm for encryption.
In the given Ns2 project there are lots of CPP programs. Even if removed also working without any change. I removed All cpp files.
The graphs are generated based on the .xg files. The worst thing is the values are not changing. They are just constants.
In the base paper the project should contain battle forces and region but in the project, we have only one user that does not belong to any region and battle force.
The key values are generated three times but they are not at all used anywhere for the ENCRYPTION AND DECRYPTION  purpose to run the project we need DSR or AODV protocols but they are not using anywhere.
The main problem is the advantages of the project like key revocation, Forward, and backward Secrecy are not at all discussed. SO whats the main purpose of this project?
We need a database in the project to show the forward and backward secrecy. But no database used in this project.
We need central key authority and Local key authority but only one key authority used.
The path is not showing for the Sending encryption and decryption message. Just used that 1 node send it 2 And 2 send it to 3  like that. Sending msg should do using routing algorithm but here just used a FOR loop and displayed at the bottom.

2016 NS2 Projects

Welcome to Latest NS2 Projects Section, Here We have developed the Latest 2016 journal Papers on different domains like networking, network security, Wireless Sensor Networks, Wireless Ad Hoc Networks, MANET, etc. Even you can find the best 2015, 2014 NS2 Titles below:

2016 Journal Papers

  1. Mitigating the dropping attacks by support of node privacy in wireless ad hoc networks
  2. Discriminate the collusion attacks by suing data aggregation in wireless sensor networks
  3. To mitigate the trust fluctuations in unattended wireless sensor networks by support of trust management
  4. Discriminating the attacks by using data aggregation technique secure way in wireless sensor networks
  5. Efficient data access in delay tolerant networks by support of cache secure data
  6. Secure data discovery in wireless sensor networks with efficiency
  7. Improve the performance of cluster based networks for secure data transmission
  8. Secure routing in delay tolerant networks by using dynamic trust management system
  9. Efficient data access in wireless sensor network by using trust with authority
  10. Host based intrusion detection system and cooperative mechanism for mitigating the accuracy in virtual network systems
  11. Mitigate the energy consumption in dynamic wireless sensor networks using mathematical model
  12. Performance of network lifetime using energy balanced routing method in WSN
  13. Improve the performance of network based on packet generation
  14. Improve the lifetime of network by the affect of mitigating the hop count

2015 Journal Papers

  1. Privacy preserving and truthful detection of packet ropping attacks in wireless ad hoc networks
  2. A secure distributed data discovery and dissemination in wsns
  3. Secure and efficient data transmission for cluster based wireless networks
  4. An efficient distributed trust model for wsns
  5. Effective key management in dynamic wireless sensor networks
  6. Impact of limiting hop count on the lifetime of wireless sensor networks
  7. Defending against collaborative attacks by malicious nodes in manets: a cooperative bait detection approach
  8. Design and simulation of enhanced MODLEACH for wsn
  9. An algorithm to detect malicious nodes in wireless sensor network using Enhanced MODLEACH
  10. An enhanced cluster-head selection scheme for distributed heterogeneous wireless sensor network

2014 Journal Papers

  1. Secure data aggregation technique for wireless sensor network in the presence of collusion attacks
  2. Secure data aggregation in wireless sensor networks: filtering out the attackers impact
  3. Cooperative caching for efficient data access in disruption tolerant networks
  4. Dynamic trust management for delay tolerant networks and its application to secure routing
  5. An energy balanced routing method based on forward-aware factor for wsns
  6. Automatic test packet generation
  7. Randomized multipath routing in wsns
  8. Using identity and trust based management for MANET

NS2 Training

NS2 (Network Simulator-2 Training) Course Content:

Basics: 1

Routing Protocols: 1

Type of Networks: 1

Wired Network: 1

Wireless Network: 2

Wireless Sensor Network: 2

Apply New Features: 2


  • NS2 Introduction
  • NS2 Architecture
  • NS2 Components
  • NS2 Installation
  • Installation of supporting software
  • Linux Basics
  • Exploring example scripts
  • TCL basic commands
  • OTCL Programming
  • Simulation Trace Analysis using Perl/Awk etc
  • Plotting graphs with XGraph

Routing Protocols:

  • Proactive protocols (DSDV, OLSR,..)
  • Reactive Protocols (AODV, DSR,…).
  • Hybrid Protocols (ZRP, etc…..).

Type of Networks:

Wired Network:

  • Deep explanation on wired networks
  • Designing of different topologies

Ex: Ring, Star, Dumbbell Topologies

Wireless Network:

  • Setting and configuration of Parameters for wireless networks
  • Designing different Wireless Topologies (MANET,VANET)
  • Trace file Analysis using PERL/AWK
  • Plotting graphs for simple Wireless Networks and Ad hoc Networks

Wireless Sensor Network:

  • Applications of Wireless Sensor Networks

Apply New Features:

  • Patching NS2 for unsupported features
  • Linkage between C++ and Otcl.
  • Perl/awk for trace files analysis

Contact Us for More details

2014 IEEE NS2 Projects List

Welcome to the NS2 Projects Section. Here all 2014 Network Simulator NS2 Projects are available with Source code, Documentation and Execution/Explanation Support.  Find the below List of Academic 2014-15 NS2 Projects.

S.No Title Domain
1 Black Hole Attack in Mobile Ad Hoc Networks Mobile Computing
2 An Efficient Secure AODV Routing Protocol in MANET Mobile Computing
3 Trust Improvement among the nodes in a Wireless Adhoc`


Mobile Computing
4 Intrusion Detection in Wireless Sensor Networks Mobile Computing
5 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Mobile Computing
6 ALBA-R-Load-Balancing-Geographic-Routing Around onnectivity-Holes-in-Wireless-Sensor-Networks Mobile Computing
7 Wireless Sensor Network LEACH Protocol Mobile Computing
8 Trust Management for Effective Collaborative Intrusion Detection Networks(Dirichlet) Networking
9 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Mobile Computing
10 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Mobile Computing
11 Cluster and Traffic Distribution Protocol for Energy Consumption in Wireless Sensor Network Wireless communication
12 Privacy preserving Data Aggregation in WSN Mobile Computing
13 Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs Mobile Computing
14 Delay Analysis in Mobile Adhoc Networks Mobile Computing
15 Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure Mobile Computing
16 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection Mobile Computing
17 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Mobile Computing
18 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Parallel and Distributed Systems
19 Secure Continuous Aggregation in Wireless Sensor Networks Parallel and Distributed Systems
20 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing Parallel and Distributed Systems
21 ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks Parallel and Distributed Systems
22 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Mobile Computing
23 Distributed Cooperative Caching in Social Wireless Networks Mobile Computing
24 EAACK—A Secure Intrusion-Detection System for MANETs Industrial Electronics
25 Maximal Scheduling in Wireless Ad Hoc Networks With Hypergraph Interference Models Vehicular Technology
26 Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network Mobile Computing
27 DSDMAC: Dual Sensing Directional MAC Protocol

for Ad Hoc Networks with Directional Antennas

Vehicular Technology
28 A Highly Effective and Efficient Route Discovery & maintenance in DSR Mobile Computing
29 AODV Routing Implementation for Scalable Wireless Ad-Hoc Network Simulation (SWANS) Mobile Computing
30 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks Mobile Computing
31 On the Node Clone Detection in Wireless Sensor Networks Networking
32 Fast Retransmission Scheme for Overcoming Hidden Node

Problem in IEEE 802.11 Networks

Mobile Computing
33 Operator-Friendly Traffic Engineering in IP/MPLS Core Networks Networking
34 The Three-Tier Security Scheme in Wireless

Sensor Networks with Mobile Sinks

Parallel and Distributed Systems
35 Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Mobile Computing
36 AODV-COD:AODV Routing Protocol with Coding

Opportunity Discovery

Mobile Computing
37 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Mobile Computing
38 An Efficient and Robust Addressing Protocol for Node Auto-configuration in Ad Hoc Networks Networking
39 IPv4 based Hierarchical Distributive Auto-Configuration Protocol for MANETs Mobile Computing

Contact us for more details.