Main Reference PaperMAODV:Modified Wormhole Detection AODV Protocol, IEEE Transactions on Network Security, 2013.
  • Wormhole attack is one of the most severe attacks with mobile ad-hoc networks. The proposed system is an efficient method to detect a wormhole attack is called as Modified Wormhole Detection AODV. A wormhole can be formed using In-band channel and the Out-of band channel. Detection of wormhole attack is performed using number of hops in different paths from source to destination and delay of each node in different paths from source to destination.

+ Description
  • Wormhole attack is one of the most severe attacks with mobile ad-hoc networks. The proposed system is an efficient method to detect a wormhole attack is called as Modified Wormhole Detection AODV. A wormhole can be formed using In-band channel and the Out-of band channel. Detection of wormhole attack is performed using number of hops in different paths from source to destination and delay of each node in different paths from source to destination.

  • To detect the wormhole attack without any hardware requirement.

  • To detect and prevent the In band and Out of band channel of wormhole attack in the network

+ Aim & Objectives
  • To detect the wormhole attack without any hardware requirement.

  • To detect and prevent the In band and Out of band channel of wormhole attack in the network

  • The Wormhole Prevention Mechanism is contributed, in which nodes must be able to authenticate that the data has been sent by the legitimate node. A node receiving the RREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ.

+ Contribution
  • The Wormhole Prevention Mechanism is contributed, in which nodes must be able to authenticate that the data has been sent by the legitimate node. A node receiving the RREQ verifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

1 Comment

Comments are closed.