Main Reference PaperBlackHole Attack and Detection Method for AODV Routing Protocol in MANETs, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), April 2013.
  • In MANET, black hole is an attack in which a node shows malicious behavior by claiming false RREP message to the source node and correspondingly malicious node drops all the receiving packets. Most of the existing mechanisms depend on the Cryptographic Techniques for detecting the black hole attack.

+ Description
  • In MANET, black hole is an attack in which a node shows malicious behavior by claiming false RREP message to the source node and correspondingly malicious node drops all the receiving packets. Most of the existing mechanisms depend on the Cryptographic Techniques for detecting the black hole attack.

  • To implement the blackhole attack in MANET

  • To detect the blackhole attack in MANET

+ Aim & Objectives
  • To implement the blackhole attack in MANET

  • To detect the blackhole attack in MANET

  • Proposed work presents the detection mechanism to secure the MANET from Black hole attacks. The simulation is conducted by modifying the aodv.cc and aodv.h files have been modified to implement the attack.

+ Contribution
  • Proposed work presents the detection mechanism to secure the MANET from Black hole attacks. The simulation is conducted by modifying the aodv.cc and aodv.h files have been modified to implement the attack.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

1 Comment

Comments are closed.