Main Reference Paper Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs, International Journal of Computer Applications, May 2015.
  • Basic idea behind S-ALERT is to divide the whole network into number of nodes and then each node is allocated a unique Id, so that we can differentiate source and destination node. Followed by dynamic partition of network into zones nodes are chosen in zones as random forwarder, which forms a non trace able innominate route. Along with, it also hides the source/destination node among many source/destination, in order to give very high safety to source node and destination node.

+ Description
  • Basic idea behind S-ALERT is to divide the whole network into number of nodes and then each node is allocated a unique Id, so that we can differentiate source and destination node. Followed by dynamic partition of network into zones nodes are chosen in zones as random forwarder, which forms a non trace able innominate route. Along with, it also hides the source/destination node among many source/destination, in order to give very high safety to source node and destination node.

  • To provide full anonymity protection to identity of source node, destination node and data packets.

  • To prevent from timing attacks and intersection attacks.

+ Aim & Objectives
  • To provide full anonymity protection to identity of source node, destination node and data packets.

  • To prevent from timing attacks and intersection attacks.

  • A technique is contributed to make the S-ALERT system bulletproof to types of attacks. Hence it should have counter measures to be safe from all attacks which harm it. S-ALERT system is not feasible for network models so there is need to make some changes in S-ALERT. It can also achieve comparable routing efficiency to the base-line GPSR algorithm. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks.

+ Contribution
  • A technique is contributed to make the S-ALERT system bulletproof to types of attacks. Hence it should have counter measures to be safe from all attacks which harm it. S-ALERT system is not feasible for network models so there is need to make some changes in S-ALERT. It can also achieve comparable routing efficiency to the base-line GPSR algorithm. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.