Main Reference Paper Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks, Springer, Wireless Personal Communication, 2018 [NS2]
  • A dynamic trust based intrusion detection technique is proposed to detect and isolate the selfish nodes from the network, where the direct trust degree based on direct communication interactions and indirect (recommended) trust degree based on the neighbors recommendations are taking into account to accurately judge the selfishness nature of the nodes.

Description
  • A dynamic trust based intrusion detection technique is proposed to detect and isolate the selfish nodes from the network, where the direct trust degree based on direct communication interactions and indirect (recommended) trust degree based on the neighbors recommendations are taking into account to accurately judge the selfishness nature of the nodes.

  • To detect and isolate the attacker in the network

  • To improve the reliability and security

Aim & Objectives
  • To detect and isolate the attacker in the network

  • To improve the reliability and security

  • A technique is contributed to further improve the security and isolate the attacker.

Contribution
  • A technique is contributed to further improve the security and isolate the attacker.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit