Main Reference PaperDetection of Malicious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme, International Conference on Advances in Computing, Communication and Control, 2015.
  • Improved Watchdog protocol called as I-Watchdog protocol with Destination-Sequenced Distance-Vector Routing (DSDV) routing protocol is proposed that provides efficient and secure routing with prevention of denial of service attack as well as detection of congestion in the network background. I-Watchdog procedure does proficient recognition of the presence of malicious nodes in a mobile ad hoc network as well as it finds the genuine reason of the happening of loss of packets.

+ Description
  • Improved Watchdog protocol called as I-Watchdog protocol with Destination-Sequenced Distance-Vector Routing (DSDV) routing protocol is proposed that provides efficient and secure routing with prevention of denial of service attack as well as detection of congestion in the network background. I-Watchdog procedure does proficient recognition of the presence of malicious nodes in a mobile ad hoc network as well as it finds the genuine reason of the happening of loss of packets.

  • To protect network from black hole attack which leads to a denial of service attack and find the actual cause of event of packet dropping.

  • To differentiate between congestion and attack using I-Watchdog protocol.

+ Aim & Objectives
  • To protect network from black hole attack which leads to a denial of service attack and find the actual cause of event of packet dropping.

  • To differentiate between congestion and attack using I-Watchdog protocol.

  • The Improved Detection and Prevention (IDP) of Watchdog protocol is contributed to the existing I-Watchdog protocol to prevent the attack. Route that has malicious node is discarded and data transmission is carried out over alternate path.

+ Contribution
  • The Improved Detection and Prevention (IDP) of Watchdog protocol is contributed to the existing I-Watchdog protocol to prevent the attack. Route that has malicious node is discarded and data transmission is carried out over alternate path.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

1 Comment

Comments are closed.