Main Reference PaperLifetime elongation of ad hoc networks under flooding attack using power-saving technique, 2013.
  • The proposed approach can suppress redundant RREQ packets using the co-operation of destination node and neighbor nodes withinOne-Hop range of the attacking node. A Petri Net design was developed to model the proposed approach and configure all relevant system aspects in a concise fashion for qualitative analysis.

+ Description
  • The proposed approach can suppress redundant RREQ packets using the co-operation of destination node and neighbor nodes withinOne-Hop range of the attacking node. A Petri Net design was developed to model the proposed approach and configure all relevant system aspects in a concise fashion for qualitative analysis.

  • To find the possible solutions for prior Flooding Attacking issues.

  • To mitigate the impact from Flooding Attacks.

+ Aim & Objectives
  • To find the possible solutions for prior Flooding Attacking issues.

  • To mitigate the impact from Flooding Attacks.

  • The proposed work contributes the Authentication based Power Saving Techniques under the flooding attack. A node receiving theRREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ.

+ Contribution
  • The proposed work contributes the Authentication based Power Saving Techniques under the flooding attack. A node receiving theRREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.