Main Reference PaperMitigate Black Hole Attack In Dynamic Source Routing (DSR) Protocol By Trapping, International Journal of Computer Science Issues, July 2013.
  • The proposed routing is based on DSR and is modified with Detection algorithm. It is divided into two phases: Detection during Route Establishment and Detection during Data Forwarding. The silent feature of proposed scheme is its simplicity and effectiveness indetecting malicious nodes even when the network is highly dynamic

+ Description
  • The proposed routing is based on DSR and is modified with Detection algorithm. It is divided into two phases: Detection during Route Establishment and Detection during Data Forwarding. The silent feature of proposed scheme is its simplicity and effectiveness indetecting malicious nodes even when the network is highly dynamic

  • Its simplicity and effectiveness in detecting malicious nodes even when the network is highly dynamic.

  • To mitigate the malicious nodesforming black hole attack in dynamic ad hoc network

+ Aim & Objectives
  • Its simplicity and effectiveness in detecting malicious nodes even when the network is highly dynamic.

  • To mitigate the malicious nodesforming black hole attack in dynamic ad hoc network

  • Wireless mobile Ad Hoc network is likely to be attacked by the black hole attack. A course based method is presented to detect black hole attack that the proposed method has good performance against Black hole attack without much overhead.

+ Contribution
  • Wireless mobile Ad Hoc network is likely to be attacked by the black hole attack. A course based method is presented to detect black hole attack that the proposed method has good performance against Black hole attack without much overhead.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.