Main Reference PaperCluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks, IEEE Transactions on Parallel and Distributed systems, 2013.
  • The proposed system introduces the model of the proposed cluster-based revocation scheme, which can quickly revoke attacker nodes upon receiving only one accusation from neighboring node. The scheme maintains two different lists, warning list and blacklist, in order to guard against malicious nodes from further framing other legitimate nodes. Nodes cooperate to form clusters, and each cluster consists of a Cluster Head(CH) along with some Cluster Members (CMs) located within the transmission range of their Cluster Head(CH). Before nodes can join the network, they have to acquire valid certificates from the CA, which is responsible for distributing and managing certificates of all nodes, so that nodes can communicate with each other unrestrainedly in a MANET.

+ Description
  • The proposed system introduces the model of the proposed cluster-based revocation scheme, which can quickly revoke attacker nodes upon receiving only one accusation from neighboring node. The scheme maintains two different lists, warning list and blacklist, in order to guard against malicious nodes from further framing other legitimate nodes. Nodes cooperate to form clusters, and each cluster consists of a Cluster Head(CH) along with some Cluster Members (CMs) located within the transmission range of their Cluster Head(CH). Before nodes can join the network, they have to acquire valid certificates from the CA, which is responsible for distributing and managing certificates of all nodes, so that nodes can communicate with each other unrestrainedly in a MANET.

  • To provide high accuracy in detection of attackers.

  • To reduce communication overhead.

  • To increase reliability.

  • To enhance network security.

+ Aim & Objectives
  • To provide high accuracy in detection of attackers.

  • To reduce communication overhead.

  • To increase reliability.

  • To enhance network security.

  • An efficient Energy, Degree aware Clustering Algorithm which involves the important features such as degree, energy and transmissionrange. Using this algorithm a node with higher residual energy, higher degree is more likely elected as a cluster head. The members of each cluster communicate directly with their Cluster Heads (CHs) and each. Clustering algorithm elects the node having high connectivity, closer to destination and reduced power consumption node as a cluster head (CH).

+ Contribution
  • An efficient Energy, Degree aware Clustering Algorithm which involves the important features such as degree, energy and transmissionrange. Using this algorithm a node with higher residual energy, higher degree is more likely elected as a cluster head. The members of each cluster communicate directly with their Cluster Heads (CHs) and each. Clustering algorithm elects the node having high connectivity, closer to destination and reduced power consumption node as a cluster head (CH).

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.