SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING
ATTACKS IN WIRELESS AD HOC NETWORKS
ABSTRACT:
Link error and malicious packet dropping are two sources for packet losses in multi-hop
wireless ad hoc network. In this paper, while observing a sequence of packet losses in the
network, we are interested in determining whether the losses are caused by link errors only, or by
the combined effect of link errors and malicious drop. We are especially interested in the insider-
attack case, whereby malicious nodes that are part of the route exploit their knowledge of the
communication context to selectively drop a small amount of packets critical to the network
performance. Because the packet dropping rate in this case is comparable to the channel error
rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve
satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the
correlations between lost packets. Furthermore, to ensure truthful calculation of these
correlations, we develop a homomorphic linear authenticator (HLA) based public auditing
architecture that allows the detector to verify the truthfulness of the packet loss information
reported by nodes. This construction is privacy preserving, collusion proof, and incurs low
communication and storage overheads. To reduce the computation overhead of the baseline
scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection
accuracy for lower computation complexity. Through extensive simulations, we verify that the
proposed mechanisms achieve significantly better detection accuracy than conventional methods
such as a maximum-likelihood based detection.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
 The most of the related works preclude the ambiguity of the environment by assuming
that malicious dropping is the only source of packet loss, so that there is no need to
account for the impact of link errors. On the other hand, for the small number of works
that differentiate between link errors and malicious packet drops, their detection
algorithms usually require the number of maliciously-dropped packets to be significantly
higher than link errors, in order to achieve an acceptable detection accuracy.
 Depending on how much weight a detection algorithm gives to link errors relative to
malicious packet drops, the related work can be classified into the following two
categories.
 The first category aims at high malicious dropping rates, where most (or all) lost packets
are caused by malicious dropping.
 The second category targets the scenario where the number of maliciously dropped
packets is significantly higher than that caused by link errors, but the impact of link errors
is non-negligible.
DISADVANTAGES OF EXISTING SYSTEM:
In an open wireless environment, link errors are quite significant, and may not be
significantly smaller than the packet dropping rate of the insider attacker. So, the insider
attacker can camouflage under the background of harsh channel conditions. In this case,
just by observing the packet loss rate is not enough to accurately identify the exact cause
of a packet loss. This problem has not been well addressed in the existing system.
In the existing system first category case, the impact of link errors is ignored.
In the second Category, Certain knowledge of the wireless channel is necessary in this
case.
PROPOSED SYSTEM:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
 In this paper, we develop an accurate algorithm for detecting selective packet drops made
by insider attackers.
 Our algorithm also provides a truthful and publicly verifiable decision statistics as a proof
to support the detection decision. The high detection accuracy is achieved by exploiting
the correlations between the positions of lost packets, as calculated from the auto-
correlation function (ACF) of the packet-loss bitmap—a bitmap describing the
lost/received status of each packet in a sequence of consecutive packet transmissions.
 The basic idea behind this method is that even though malicious dropping may result in a
packet loss rate that is comparable to normal channel losses, the stochastic processes that
characterize the two phenomena exhibit different correlation structures (equivalently,
different patterns of packet losses). Therefore, by detecting the correlations between lost
packets, one can decide whether the packet loss is purely due to regular link errors, or is a
combined effect of link error and malicious drop.
 Our algorithm takes into account the cross-statistics between lost packets to make a more
informative decision, and thus is in sharp contrast to the conventional methods that rely
only on the distribution of the number of lost packets.
ADVANTAGES OF PROPOSED SYSTEM:
 The proposed system with new HLA construction is collusion-proof.
 The proposed system gives the advantage of privacy-preserving.
 Our construction incurs low communication and storage overheads at intermediate nodes.
This makes our mechanism applicable to a wide range of wireless devices, including low-
cost wireless sensors that have very limited bandwidth and memory capacities. This is
also in sharp contrast to the typical storage-server scenario, where bandwidth/storage is
not considered an issue.
 Last, to significantly reduce the computation overhead of the baseline constructions so
that they can be used in computation-constrained mobile devices, a packet-block-based
algorithm is proposed to achieves scalable signature generation and detection. This
mechanism allows one to trade detection accuracy for lower computation complexity.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
BLOCK DIAGRAM:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command Language)
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Tao Shu and Marwan Krunz, “Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks”, IEEE TRANSACTIONS ON MOBILE
COMPUTING, VOL. 14, NO. 4, APRIL 2015.

More Related Content

DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PDF
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PDF
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Privacy preserving and truthful detection
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
PDF
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
Adopting hybrid cryptography technique for reduction of network overhead in m...
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs

What's hot (15)

PDF
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
DOCX
a probabilistic misbehavior detection scheme toward efficient trust establish...
PDF
Https interception
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
PDF
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
PDF
TAM new report
PDF
F0352033038
PDF
H0362052056
PDF
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
PDF
Performance analysis of transport layer basedhybrid covert channel detection ...
PDF
A novel signature based traffic classification engine to reduce false alarms ...
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
PDF
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
PDF
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
PDF
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
a probabilistic misbehavior detection scheme toward efficient trust establish...
Https interception
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
TAM new report
F0352033038
H0362052056
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
Performance analysis of transport layer basedhybrid covert channel detection ...
A novel signature based traffic classification engine to reduce false alarms ...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Ad

Similar to Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks (2) (20)

DOCX
Privacy preserving and truthful detection of packet
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
DOCX
Universal network coding based opportunistic routing for
DOCX
Cost aware secure routing (caser) protocol design for wireless sensor networks
DOCX
Passive ip traceback
DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
DOCX
Optimal configuration of network coding in ad hoc networks
DOCX
Secure and distributed data discovery and dissemination in wireless sensor ne...
DOCX
Key updating for leakage resiliency with application to aes modes of operation
DOCX
Key updating for leakage resiliency with application to aes modes of operation
DOCX
Mobile data gathering with load balanced clustering and dual data uploading i...
PDF
Minimizing radio resource usage for machine to-machine communications through...
DOCX
A framework for secure computations with two
DOCX
Real time path planning based on hybrid-vanet-enhanced transportation system
DOCX
A framework for secure computations with two
PDF
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
PDF
Latest IEEE 2015 vehicular ad hoc networks
DOCX
Privacy preserving and truthful detection
Privacy preserving and truthful detection of packet
A probabilistic misbehavior detection scheme towards efficient trust establis...
Universal network coding based opportunistic routing for
Cost aware secure routing (caser) protocol design for wireless sensor networks
Passive ip traceback
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Optimal configuration of network coding in ad hoc networks
Secure and distributed data discovery and dissemination in wireless sensor ne...
Key updating for leakage resiliency with application to aes modes of operation
Key updating for leakage resiliency with application to aes modes of operation
Mobile data gathering with load balanced clustering and dual data uploading i...
Minimizing radio resource usage for machine to-machine communications through...
A framework for secure computations with two
Real time path planning based on hybrid-vanet-enhanced transportation system
A framework for secure computations with two
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
Latest IEEE 2015 vehicular ad hoc networks
Privacy preserving and truthful detection
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
A comparative analysis of optical character recognition models for extracting...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology

Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks (2)

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS ABSTRACT: Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider- attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM:  The most of the related works preclude the ambiguity of the environment by assuming that malicious dropping is the only source of packet loss, so that there is no need to account for the impact of link errors. On the other hand, for the small number of works that differentiate between link errors and malicious packet drops, their detection algorithms usually require the number of maliciously-dropped packets to be significantly higher than link errors, in order to achieve an acceptable detection accuracy.  Depending on how much weight a detection algorithm gives to link errors relative to malicious packet drops, the related work can be classified into the following two categories.  The first category aims at high malicious dropping rates, where most (or all) lost packets are caused by malicious dropping.  The second category targets the scenario where the number of maliciously dropped packets is significantly higher than that caused by link errors, but the impact of link errors is non-negligible. DISADVANTAGES OF EXISTING SYSTEM: In an open wireless environment, link errors are quite significant, and may not be significantly smaller than the packet dropping rate of the insider attacker. So, the insider attacker can camouflage under the background of harsh channel conditions. In this case, just by observing the packet loss rate is not enough to accurately identify the exact cause of a packet loss. This problem has not been well addressed in the existing system. In the existing system first category case, the impact of link errors is ignored. In the second Category, Certain knowledge of the wireless channel is necessary in this case. PROPOSED SYSTEM:
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com  In this paper, we develop an accurate algorithm for detecting selective packet drops made by insider attackers.  Our algorithm also provides a truthful and publicly verifiable decision statistics as a proof to support the detection decision. The high detection accuracy is achieved by exploiting the correlations between the positions of lost packets, as calculated from the auto- correlation function (ACF) of the packet-loss bitmap—a bitmap describing the lost/received status of each packet in a sequence of consecutive packet transmissions.  The basic idea behind this method is that even though malicious dropping may result in a packet loss rate that is comparable to normal channel losses, the stochastic processes that characterize the two phenomena exhibit different correlation structures (equivalently, different patterns of packet losses). Therefore, by detecting the correlations between lost packets, one can decide whether the packet loss is purely due to regular link errors, or is a combined effect of link error and malicious drop.  Our algorithm takes into account the cross-statistics between lost packets to make a more informative decision, and thus is in sharp contrast to the conventional methods that rely only on the distribution of the number of lost packets. ADVANTAGES OF PROPOSED SYSTEM:  The proposed system with new HLA construction is collusion-proof.  The proposed system gives the advantage of privacy-preserving.  Our construction incurs low communication and storage overheads at intermediate nodes. This makes our mechanism applicable to a wide range of wireless devices, including low- cost wireless sensors that have very limited bandwidth and memory capacities. This is also in sharp contrast to the typical storage-server scenario, where bandwidth/storage is not considered an issue.  Last, to significantly reduce the computation overhead of the baseline constructions so that they can be used in computation-constrained mobile devices, a packet-block-based algorithm is proposed to achieves scalable signature generation and detection. This mechanism allows one to trade detection accuracy for lower computation complexity.
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com SYSTEM ARCHITECTURE:
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com BLOCK DIAGRAM: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Tao Shu and Marwan Krunz, “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 4, APRIL 2015.