Main Reference PaperAn Energy Efficient Approach for Wormhole Detection and Prevention, International Journal of Computer Applications, August 2013.
  • A Wormhole Detection and Prevention Scheme has been proposed in order to save battery power. Proposed scheme upgrade Neighbor node Information Scheme for wormhole detection by encapsulating hop count scheme. Basically in neighbor node scheme there is problem for selection of threshold value. Proposed methodology overcomes that problem by using hop count scheme under that decision.

+ Description
  • A Wormhole Detection and Prevention Scheme has been proposed in order to save battery power. Proposed scheme upgrade Neighbor node Information Scheme for wormhole detection by encapsulating hop count scheme. Basically in neighbor node scheme there is problem for selection of threshold value. Proposed methodology overcomes that problem by using hop count scheme under that decision.

  • To detect the Wormhole Attack without any hardware requirement and with minimum overhead using a simple and Efficient Effective Mechanism.

  • To detect wormhole proposed technique based on neighbor node and hop count method.

+ Aim & Objectives
  • To detect the Wormhole Attack without any hardware requirement and with minimum overhead using a simple and Efficient Effective Mechanism.

  • To detect wormhole proposed technique based on neighbor node and hop count method.

  • The Wormhole prevention mechanism is contributed, in which nodes must be able to authenticate that the data has been sent by the legitimate node. A node receiving the RREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ. In order to detect Wormhole proposed technique use the larger number of control packet.

+ Contribution
  • The Wormhole prevention mechanism is contributed, in which nodes must be able to authenticate that the data has been sent by the legitimate node. A node receiving the RREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ. In order to detect Wormhole proposed technique use the larger number of control packet.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.