Main Reference Paper Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network, Mobile Network Applications, 2018 [NS2].
  • One of the most severe attack in MANETs is Black-hole attacks. In order to detect the Black-hole attackers without affecting the routing performance, a fuzzy logic strategy is used on the basis of certificate authority, energy auditing, packet veracity check, and trust node. Fuzzy schema is used by assigning the prediction values to an imprecise range of data. As per the fuzzy logic scheme, the proposed scheme provides certificates to only trusted nodes. The proposed technique is more secure and reliable in military data communication.

Description
  • One of the most severe attack in MANETs is Black-hole attacks. In order to detect the Black-hole attackers without affecting the routing performance, a fuzzy logic strategy is used on the basis of certificate authority, energy auditing, packet veracity check, and trust node. Fuzzy schema is used by assigning the prediction values to an imprecise range of data. As per the fuzzy logic scheme, the proposed scheme provides certificates to only trusted nodes. The proposed technique is more secure and reliable in military data communication.

  • To detect and isolate the Black-hole attackers from the MANETs

  • To improve the network performance in military data communication environment

Aim & Objectives
  • To detect and isolate the Black-hole attackers from the MANETs

  • To improve the network performance in military data communication environment

  • A technique is contributed to further reduce end to end delay and improve throughput.

Contribution
  • A technique is contributed to further reduce end to end delay and improve throughput.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit