Improving Robustness in AD-HOC Network by Detecting Malicious Node

Existing System:

  1. Due to wireless nature, the malicious nodes can easily gain access with the wireless links
  1. Once the malicious node gain the access, they can interrupt the data communication
  1. The malicious nodes can overhear / overwrite /  manipulate / drop the packets
  1. These malicious nodes degrades the network performance.

Proposed System:

  1. In order to detect malicious nodes, we have proposed an ID-based light-weight cryptographic protocol using authentication technique.
  1. This is light-weight mechanism, which means no complex calculations are required.
  1. The proposed technique works on the cryptographic one-way hash function and doesn’t include any cryptographic high computation operations like pairing as well as exponentiation.
  1. In this method, some random nodes are assumed as Temporary servers.
  1. Each node in the network possess an unique ID
  1. The sender node generates a key pair and send the data to Temporary server.
  1. This server verifies the sender authenticity and transmit the data to receiver.
  1. If the authenticity is not valid, then the sender node would be marked as MALICIOUS .


  1. In order to segregate attackers from participating in network activities in future, we are proposing a CERTIFICATE REVOCATION method.
  1. According to this, the network is divided into different clusters and CH nodes are elected.
  1. These CH nodes keep maintaining of the Certificates  / keys of each its member nodes.
  1. if any node found as MALICIOUS, then the node’s certificate would be immediately revoked.
  1. without a valid certificate / keys, the malicious nodes cannot communicate with the network in future.

Simulation Results:

A cluster-based certificate revocation scheme is able to revoke malicious nodes certificate quickly on the basis of only one vote from the neighbor. In this system, CA maintains two different lists, warning list and black list, to keep track on the malicious nodes so as such nodes cannot take part in certificate revocation.


Fig: PDR

Fig: Drop

Fig: Throughout

Fig: Delay

Hardware Requirements:

System:    Pentium IV 2.4 GHz.

Hard Disk:     50 GB.

Floppy Drive:  1.44 Mb.

Monitor:         18 VGA Color.

Mouse:            Logitech.

Ram:              2048 Mb.

Software Requirements:

Operating system:    Ubuntu 14.04/Red Hat Linux9/Linux Mint

Coding Language:    otcl, c++

Tool:                        Ns-2.34/Ns-2.35 

 Download This Improving Robustness in AD-HOC Network by Detecting Malicious Node NS2 project Code

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NS2 Project

In the Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NS2 Project encryption done using Attribute-based encryption. Previously we are using RSA algorithm for encryption.
In the given Ns2 project there are lots of CPP programs. Even if removed also working without any change. I removed All cpp files.
The graphs are generated based on the .xg files. The worst thing is the values are not changing. They are just constants.
In the base paper the project should contain battle forces and region but in the project, we have only one user that does not belong to any region and battle force.
The key values are generated three times but they are not at all used anywhere for the ENCRYPTION AND DECRYPTION  purpose to run the project we need DSR or AODV protocols but they are not using anywhere.
The main problem is the advantages of the project like key revocation, Forward, and backward Secrecy are not at all discussed. SO whats the main purpose of this project?
We need a database in the project to show the forward and backward secrecy. But no database used in this project.
We need central key authority and Local key authority but only one key authority used.
The path is not showing for the Sending encryption and decryption message. Just used that 1 node send it 2 And 2 send it to 3  like that. Sending msg should do using routing algorithm but here just used a FOR loop and displayed at the bottom.

2016 NS2 Projects

Welcome to Latest NS2 Projects Section, Here We have developed the Latest 2016 journal Papers on different domains like networking, network security, Wireless Sensor Networks, Wireless Ad Hoc Networks, MANET, etc. Even you can find the best 2015, 2014 NS2 Titles below:

2016 Journal Papers

  1. Mitigating the dropping attacks by support of node privacy in wireless ad hoc networks
  2. Discriminate the collusion attacks by suing data aggregation in wireless sensor networks
  3. To mitigate the trust fluctuations in unattended wireless sensor networks by support of trust management
  4. Discriminating the attacks by using data aggregation technique secure way in wireless sensor networks
  5. Efficient data access in delay tolerant networks by support of cache secure data
  6. Secure data discovery in wireless sensor networks with efficiency
  7. Improve the performance of cluster based networks for secure data transmission
  8. Secure routing in delay tolerant networks by using dynamic trust management system
  9. Efficient data access in wireless sensor network by using trust with authority
  10. Host based intrusion detection system and cooperative mechanism for mitigating the accuracy in virtual network systems
  11. Mitigate the energy consumption in dynamic wireless sensor networks using mathematical model
  12. Performance of network lifetime using energy balanced routing method in WSN
  13. Improve the performance of network based on packet generation
  14. Improve the lifetime of network by the affect of mitigating the hop count

2015 Journal Papers

  1. Privacy preserving and truthful detection of packet ropping attacks in wireless ad hoc networks
  2. A secure distributed data discovery and dissemination in wsns
  3. Secure and efficient data transmission for cluster based wireless networks
  4. An efficient distributed trust model for wsns
  5. Effective key management in dynamic wireless sensor networks
  6. Impact of limiting hop count on the lifetime of wireless sensor networks
  7. Defending against collaborative attacks by malicious nodes in manets: a cooperative bait detection approach
  8. Design and simulation of enhanced MODLEACH for wsn
  9. An algorithm to detect malicious nodes in wireless sensor network using Enhanced MODLEACH
  10. An enhanced cluster-head selection scheme for distributed heterogeneous wireless sensor network

2014 Journal Papers

  1. Secure data aggregation technique for wireless sensor network in the presence of collusion attacks
  2. Secure data aggregation in wireless sensor networks: filtering out the attackers impact
  3. Cooperative caching for efficient data access in disruption tolerant networks
  4. Dynamic trust management for delay tolerant networks and its application to secure routing
  5. An energy balanced routing method based on forward-aware factor for wsns
  6. Automatic test packet generation
  7. Randomized multipath routing in wsns
  8. Using identity and trust based management for MANET

NS2 Training

NS2 (Network Simulator-2 Training) Course Content:

Basics: 1

Routing Protocols: 1

Type of Networks: 1

Wired Network: 1

Wireless Network: 2

Wireless Sensor Network: 2

Apply New Features: 2


  • NS2 Introduction
  • NS2 Architecture
  • NS2 Components
  • NS2 Installation
  • Installation of supporting software
  • Linux Basics
  • Exploring example scripts
  • TCL basic commands
  • OTCL Programming
  • Simulation Trace Analysis using Perl/Awk etc
  • Plotting graphs with XGraph

Routing Protocols:

  • Proactive protocols (DSDV, OLSR,..)
  • Reactive Protocols (AODV, DSR,…).
  • Hybrid Protocols (ZRP, etc…..).

Type of Networks:

Wired Network:

  • Deep explanation on wired networks
  • Designing of different topologies

Ex: Ring, Star, Dumbbell Topologies

Wireless Network:

  • Setting and configuration of Parameters for wireless networks
  • Designing different Wireless Topologies (MANET,VANET)
  • Trace file Analysis using PERL/AWK
  • Plotting graphs for simple Wireless Networks and Ad hoc Networks

Wireless Sensor Network:

  • Applications of Wireless Sensor Networks

Apply New Features:

  • Patching NS2 for unsupported features
  • Linkage between C++ and Otcl.
  • Perl/awk for trace files analysis

Contact Us for More details

2015 IEEE NS2 Projects List

These below Latest 2015-2016 NS2 Projects developed for Final Year Students of B.Tech & M.Tech. We Provide NS2 Project Training and Paper Implementation, Project documentation Preparation with PPT Presentation with affordable price.


Sl.No Project Title Year
1 Joint Access   Control and Resource   Allocation for Concurrent and Massive Access of M2M Devices 2015
2 Downlink Power Control in Self-Organizing Dense Small Cells Underlaying Macrocells: A Mean Field Game 2015
3 Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks 2015
4 Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks 2015
5 Greening Geographical Load Balancing 2015
6 A Hierarchical Account-Aided Reputation Management System for MANETs 2015
7 Utility Fair Optimization of Antenna Tilt Angles in LTE Net works 2015
8 Efficient Allocation Of Periodic Feedback Channels In Broadband Wireless Networks 2015
9 Proportional Fair Coding For wireless mesh Networks 2015
10 Exploiting Asynchronous Amplify-And-Forward Relays To Enhance The Performance Of Ieee 802.11 Networks 2015
11 Cellular Architecture And Key Technologies For 5g Wireless Communication Networks 2015
12 Energy-Efficient Sensor Scheduling Algorithm in Cognitive Radio Networks Employing Heterogeneous Sensors 2015
13 Opportunistic Spectrum Access with Two Channel Sensing in Cognitive Radio Networks 14 Optimal Scheduling for Multi-Radio Multi-Channel Multi-Hop Cognitive Cellular Networks 2015
14 DSCA: Dynamic Spectrum Co-Access Between the Primary Users and the Secondary Users 2015
15 On Joint Power and Admission Control in Underlay Cellular Cognitive Radio Networks 2015
16 Cooperative Relay Selection in Cognitive Radio Networks 2015
17 Statistical Modeling of Spectrum Sensing Energy in Multi-Hop Cognitive Radio Networks 2015
18 Adaptive Random Access for Cooperative Spectrum Sensing in Cognitive Radio Networks 2015
19 Robust Power Control Under Location and Channel Uncertainty in Cognitive Radio Networks 2015
20 Energy Efficient Collaborative Spectrum Sensing Based on Trust Management in Cognitive Radio Networks 2015
21 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015
22 A Hierarchical Account-Aided Reputation Management System for MANETs 2015
23 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2015
24 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics 2015
25 Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET 2015
26 BRACER: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance 2015
27 Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks 2015
28 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks 2015
29 CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes 2015
30 Estimating the Available Medium Access Bandwidth of IEEE 802.11 Ad Hoc Networks with Concurrent Transmissions 2015
31 Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach 2015
32 Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks 2015
33 Maximum Lifetime Scheduling for Target Coverage and Data Collection in Wireless Sensor Networks 2015
34 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks 2015
35 Joint Cooperative Routing and Power Allocation for Collision Minimization in Wireless Sensor Networks With Multiple Flows 2015
36 PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network 2015
37 A Spectral Clustering Approach to Identifying Cuts in Wireless Sensor Networks 2015
38 Non cooperative Game-Based Energy Welfare Topology Control for Wireless Sensor Networks 2015
39 Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks 2015
40 An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks 2015
41 Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network With Isolated Nodes 2015
42 Lightweight Self-Adapting Linear Prediction Algorithms for Wireless Sensor Networks 2015
43 Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources 2015
44 A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks 2015
45 ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs 2015
46 Energy-Efficient Scheduling in Green Vehicular Infrastructure With Multiple Roadside Units 2015
47 Delay-Constrained Data Aggregation in VANETs 2015
48 An Evolutionary Game Theory-Based Approach to Cooperation in VANETs Under Different Network Conditions 2015
49 Speed Adaptive Probabilistic Flooding for Vehicular Ad Hoc Networks 2015
50 A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks 2015
51 A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks 2015
52 Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding 2015
53 Optimal Configuration of Network Coding in Ad Hoc Networks 2015
54 Packet Delivery Ratio/Cost in MANETs with Erasure Coding and Packet Replication 2015
55 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015
56 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2015
57 Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems 2015
58 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015
59 A Virtual Coordinate-Based Bypassing Void Routing for WSN 2015
60 Adaptive Routing for Dynamic On-Body WSN 2015
61 An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile WSN 2015
62 Cost-Aware SEcure Routing (CASER) Protocol Design for WSN 2015
63 Efficient Coverage and Connectivity Preservation With Load Balance for WSN 2015
64 Geographic Routing in Clustered WSN Among Obstacles 2015
65 Impact of Limiting Hop Count on the Lifetime of WSN 2015
66 Joint Virtual MIMO and Data Gathering for WSN 2015
67 Time-Sensitive Utility-Based Single-Copy Routing in Low Duty Cycle WSN 2015
68 BUS-VANET: A BUS Vehicular Network Integrated with Traffic Infrastructure 2015
69 Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System 2015
70 VANET Modeling and Clustering Design Under Practical Traffic, Channel and Mobility Conditions 2015
71 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis 2015
72 VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based WSN 2015
73 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks 2015
74 An Efficient Distributed Trust Model for Wireless Sensor Networks 2015
75 An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks 2015
76 Effective Key Management in Dynamic Wireless Sensor Networks 2015
77 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks 2015
78 Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs 2015
79 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter 2015
80 Time-Delayed Broadcasting for Defeating Inside Jammers 2015
81 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015


Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks

Distributed detection in mobile access wireless sensor networks under byzantine attacks project is a NS2 based java project. In a wireless sensor network we a need a effective communication system for securing data from static and dynamic attacks. Static attack:  This is type of attack caused by malicious nodes which will send data in opposite direction with a arbitrary probalitiy .

Dynamic Attack: This is type of method used by malicious nodes where position of nodes will be changing after each attack block.

Project Abstract:

Wireless sensor networks are playing important role in military and other applications which work under different conditions. In these networks sending data and communication between nodes must be secure in order to secure data we use effective methods like reliable data fusion to control byzantine attack. In this project we use q – out –of-m rule which give best results in controlling attacks and false alarm rate under different distributed systems.

Drawbacks of System:

 Main draw back with existing system is we need a exhaustive search methods which can work with large networks.

Proposed System:

In proposed system we work on three points.

In first step explanation about q-to-m rule is done which can be applied to large networks. In order to check with large size networks optimal scheme parameters are checked with small size networks using search and then get fusion parameters for large size networks by finding a linear relation between scheme parameters and size of network. With these results we can find issues in existing systems are solved.

Secondly we find a solution for effective flexible distributed data fusion methods which can work in different conditions and control malicious nodes.  In order to implement this we use a closed form solution for q –out-of-m scheme where we use central limit algorithm.

In third step method is concluded by analyzing closed and liner methods where total attacks from malicious nodes  and false alarm rate is reduced. 

Download Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks Abstract.

Buy this project:

Contact us to buy this project at info.1000projects{at}