Main Reference Paper Secured Energy Optimized Ad Hoc On-Demand Distance Vector Routing Protocol, Computers and Electrical Engineering, 2018 [NS2].
  • The proposed black hole avoidance approach is implemented as a secure routing protocol which detects and eliminates malicious nodes in the network. Then the AES security algorithm is used to ensure a secured energy optimized expanding ring search (ERS) algorithm for the AODV routing protocol.

Description
  • The proposed black hole avoidance approach is implemented as a secure routing protocol which detects and eliminates malicious nodes in the network. Then the AES security algorithm is used to ensure a secured energy optimized expanding ring search (ERS) algorithm for the AODV routing protocol.

  • To reduce the energy consumption in the network

  • To improve the network lifetime and security in the network

Aim & Objectives
  • To reduce the energy consumption in the network

  • To improve the network lifetime and security in the network

  • A contributed technique is to further improve the security and isolate the attacker in the network.

Contribution
  • A contributed technique is to further improve the security and isolate the attacker in the network.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit