Main Reference PaperDetection and Prevention of Impersonation Attack in Wireless networks, 2014.
  • Proposed system utilizes an unsupervised thresholding approach to find an optimal threshold to partition the RSS trace of a node identity into two classes. Given the RSS is distinctively correlated to a wireless node’s physical location, the partitioned two classes will be highly correlated if there is no spoofing attacks, whereas less or not correlated when a spoofing attack is present. This proposed system uses the received signal strength (RSS)-based spatial correlation, a physical property associated with each wireless node that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks.

+ Description
  • Proposed system utilizes an unsupervised thresholding approach to find an optimal threshold to partition the RSS trace of a node identity into two classes. Given the RSS is distinctively correlated to a wireless node’s physical location, the partitioned two classes will be highly correlated if there is no spoofing attacks, whereas less or not correlated when a spoofing attack is present. This proposed system uses the received signal strength (RSS)-based spatial correlation, a physical property associated with each wireless node that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks.

  • Detection of the presence of Impersonation attacks.

  • To prevent the network from Impersonation attacks

+ Aim & Objectives
  • Detection of the presence of Impersonation attacks.

  • To prevent the network from Impersonation attacks

  • The main proposal of the secure routing is to ensure better performance in the core of the mobile network. To achieve secure communication in MANET, routing protocol must encapsulate an essential set of security mechanisms. These are mechanisms that help prevent, detect, and respond to security attacks. There are three major security goals that need to be addressed in order to maintain a reliable and secure ad-hoc network environment. The security of the ad hoc networks is considered from the following attributes: 1)Confidentiality 2) Integrity and 3) Authentication.

+ Contribution
  • The main proposal of the secure routing is to ensure better performance in the core of the mobile network. To achieve secure communication in MANET, routing protocol must encapsulate an essential set of security mechanisms. These are mechanisms that help prevent, detect, and respond to security attacks. There are three major security goals that need to be addressed in order to maintain a reliable and secure ad-hoc network environment. The security of the ad hoc networks is considered from the following attributes: 1)Confidentiality 2) Integrity and 3) Authentication.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.