Main Reference PaperDetection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks, International Journal of Computer Applications, June 2014.
  • Detect and prevent the worm hole using secret key. It is used for encryption and decryption of hello packets. In the network participated only the Authentic node. Non-authentic nodes (wormhole node) will be discarded. So malicious node cannot enter into system and communication is secured.

+ Description
  • Detect and prevent the worm hole using secret key. It is used for encryption and decryption of hello packets. In the network participated only the Authentic node. Non-authentic nodes (wormhole node) will be discarded. So malicious node cannot enter into system and communication is secured.

  • To detect the wormhole node and prevent the worm hole attack by sharing the secret key.

  • To improve the security.

+ Aim & Objectives
  • To detect the wormhole node and prevent the worm hole attack by sharing the secret key.

  • To improve the security.

  • Worm hole attack is detected at encryption and decryption of hello packet. If any one of the authentic nodes act maliciously. Worm hole node detect and prevent using authentication and confidentiality. It is used for encryption and decryption of data packet.

+ Contribution
  • Worm hole attack is detected at encryption and decryption of hello packet. If any one of the authentic nodes act maliciously. Worm hole node detect and prevent using authentication and confidentiality. It is used for encryption and decryption of data packet.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.