Main Reference PaperA Trust based Approach for Detecting and Preventing Wormhole Attack in MANET, International Journal of Computer Applications, May 2014.
  • Detect the worm hole attack any one of new node enters in the cluster first of all it is checked whether it is trusted value. If node forwards the data packets then trust value is increased otherwise decreased, at last of the trust value is compared with the definedthreshold value. If node is authenticated then it is included in data transmission path and if not then node id is deleted i.e. node is not included in data transmission path.

+ Description
  • Detect the worm hole attack any one of new node enters in the cluster first of all it is checked whether it is trusted value. If node forwards the data packets then trust value is increased otherwise decreased, at last of the trust value is compared with the definedthreshold value. If node is authenticated then it is included in data transmission path and if not then node id is deleted i.e. node is not included in data transmission path.

  • To detect the wormhole attack using trust value

  • To prevent the wormhole attack using threshold value

+ Aim & Objectives
  • To detect the wormhole attack using trust value

  • To prevent the wormhole attack using threshold value

  • A technique is contributed to improve secure transmission at the MANET.

+ Contribution
  • A technique is contributed to improve secure transmission at the MANET.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.