Main Reference PaperSecure Routing Schema for Manet with Probabilistic Node to Node forwarding, International Journal of Computer Science Issues, May 2013.
  • The nodes in MANET are subject to various attacks that range from naive eavesdropping to vicious battery draining attacks. Routing protocols, data, bandwidth and battery power are the common target of these attacks. Secure Routing Schema proposes the design of routing protocol, which is a very complex phenomenon in the case of MANET. Secure Routing Schema has presented a highly reliableSecure Routing Scheme based on node-to-node packet forwarding.

+ Description
  • The nodes in MANET are subject to various attacks that range from naive eavesdropping to vicious battery draining attacks. Routing protocols, data, bandwidth and battery power are the common target of these attacks. Secure Routing Schema proposes the design of routing protocol, which is a very complex phenomenon in the case of MANET. Secure Routing Schema has presented a highly reliableSecure Routing Scheme based on node-to-node packet forwarding.

  • To achieve the routing security

  • To improve the packet delivery ratio

+ Aim & Objectives
  • To achieve the routing security

  • To improve the packet delivery ratio

  • A technique is contribute to cryptography algorithm and improve the routing security in mobile ad hoc network

+ Contribution
  • A technique is contribute to cryptography algorithm and improve the routing security in mobile ad hoc network

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.