Main Reference Paper Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs, IEEE Access, 2016 [NS2].
  • Top-k query processing and malicious node identification are proposed based on node grouping in MANETs. In order to maintain high accuracy of the query result and detect attacks, nodes reply with k data items with the highest score along multiple routes. After detecting attacks, the query-issuing node narrows down the malicious node candidates and then tries to identify the malicious nodes through message exchanges with other nodes. In this method, each node divides all nodes into some groups by using the similarity of the information about the identified malicious nodes.

+ Description
  • Top-k query processing and malicious node identification are proposed based on node grouping in MANETs. In order to maintain high accuracy of the query result and detect attacks, nodes reply with k data items with the highest score along multiple routes. After detecting attacks, the query-issuing node narrows down the malicious node candidates and then tries to identify the malicious nodes through message exchanges with other nodes. In this method, each node divides all nodes into some groups by using the similarity of the information about the identified malicious nodes.

  • To identify the malicious nodes.

  • To identify the misclassified nodes.

+ Aim & Objectives
  • To identify the malicious nodes.

  • To identify the misclassified nodes.

  • The technique is contributed to further improve the detection accuracy.

+ Contribution
  • The technique is contributed to further improve the detection accuracy.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.