Main Reference PaperPrevention of Blackhole Attack in MANET,International Journal of Computer Networks and Wireless Communications (IJCNWC), 2012 [NS2].
  • The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route.

+ Description
  • The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route.

  • To improve the security and packet delivery ratio.

  • To reduce the delay.

+ Aim & Objectives
  • To improve the security and packet delivery ratio.

  • To reduce the delay.

  • The technique is contributed to improve the security further.

+ Contribution
  • The technique is contributed to improve the security further.

  • OS : Ubuntu 12.04 LTS 64bit

  • Simulator: NS 2.35 , Language : TCL and AWK script (C++).

+ Software Tools & Technologies
  • OS : Ubuntu 12.04 LTS 64bit

  • Simulator: NS 2.35 , Language : TCL and AWK script (C++).

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.