Main Reference Paper Secure Routing Protocol Based On Unobservable Identity in Mobile Ad-Hoc Networks, International Journal of P2P Network Trends and Technology, 2013.
  • This project also considers the Compare the packet delivery ratio, latency of the AODV with the USOR performance. Although asymmetry of PKC can provide better support for privacy protection, expensive PKC operations also bring significant computation overhead. This project proposed an unobservable routing protocol USOR based on group signature and ID-based crypto-system for ad hoc networks.

+ Description
  • This project also considers the Compare the packet delivery ratio, latency of the AODV with the USOR performance. Although asymmetry of PKC can provide better support for privacy protection, expensive PKC operations also bring significant computation overhead. This project proposed an unobservable routing protocol USOR based on group signature and ID-based crypto-system for ad hoc networks.

  • To protect all parts of a packets content, and it is independent of solutions on traffic pattern un-observability.

  • To protect privacy in ad-hoc networks

  • To propose an unobservable secure routing scheme USOR to offer complete unlink-ability and content un-observability for all types of packets.

  • To compare the performance of the USOR with AODV.

+ Aim & Objectives
  • To protect all parts of a packets content, and it is independent of solutions on traffic pattern un-observability.

  • To protect privacy in ad-hoc networks

  • To propose an unobservable secure routing scheme USOR to offer complete unlink-ability and content un-observability for all types of packets.

  • To compare the performance of the USOR with AODV.

  • The design of USOR offers strong privacy protection completes unlink-ability and content Un-observability for ad hoc networks. To revoke the attacker from participating in the network, User revocation mechanism is contributed to the proposed security protocol. Security is enhanced with revocation capabilities.

+ Contribution
  • The design of USOR offers strong privacy protection completes unlink-ability and content Un-observability for ad hoc networks. To revoke the attacker from participating in the network, User revocation mechanism is contributed to the proposed security protocol. Security is enhanced with revocation capabilities.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.