Main Reference PaperStealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions on Mobile Computing, August 2011.
  • Guard node based detection and countermeasure of stealthy attack that comprises four attacks such as Misrouting, power control, identity delegation and colluding collision is presented in this project with some additional information during route establishment and comparator count used by neighbors.

+ Description
  • Guard node based detection and countermeasure of stealthy attack that comprises four attacks such as Misrouting, power control, identity delegation and colluding collision is presented in this project with some additional information during route establishment and comparator count used by neighbors.

  • To detect the attacker accurately without accusing a legitimate node as attacker

+ Aim & Objectives
  • To detect the attacker accurately without accusing a legitimate node as attacker

  • Detection of the attack in the presence of multiple channels is contributed and throughput for various attacker models is analyzed.

+ Contribution
  • Detection of the attack in the presence of multiple channels is contributed and throughput for various attacker models is analyzed.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.