ns2 coding for malicious nodes
#1

Hi,
source code to create malicious node in ns2 using tcl.
Reply
#2

Routing is the process of choosing routes through which network traffic flows. Routing is implemented in different types of networks, for example, telephone network, electronic data networks and Internet network. In electronic data networks routing uses packet-switched technology. In packet-switched networks, routing is the route for packet forwarding and also supports the transport of packets routed from source to destination through intermediate nodes using hardware devices such as routers, bridges, gateways, firewalls, or switches.

Wireless ad hoc networks are rapidly gaining popularity as a mode of communication, especially among highly mobile sectors of society. An ad hoc mobile network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. As a result, these networks are relatively easy to deploy and use for a very short time, for example in both personal and business applications.
In addition to providing a convenient mode of communication for civil and commercial purposes, wireless ad hoc networks are highly desirable for use in war zones, remote area relief efforts and emergency situations in areas affected by disasters. In such cases, where there is no network infrastructure, a mobile ad hoc network can provide a crucial mode of communication.
Mobile devices in ad hoc networks communicate with each other through a multi-hop route using cooperating intermediate nodes. A high level of cooperation is essential for applications requiring real-time data transmission, such as soldiers transmitting information on a battlefield. However, the limited power supply of mobile devices raises doubts about the ability of each node to be fully cooperative. As a result, packet delivery can not be guaranteed even when malicious nodes are not present, and data forwarding packets do not provide a good solution.
If malicious nodes are present in a MANET, they can try to reduce network connectivity (and thus undermine network security) by pretending to be cooperative, but in effect discarding any data that is intended to be transmitted. These actions can result in defragmented networks, isolated nodes and drastically reduced network performance. Our objective is to evaluate the added effect of the presence of malicious nodes on the performance of the ad hoc network, and to determine the appropriate measures to detect malicious nodes.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ns2 programming to create wsn nodes, how to set sleep and wakeup for nodes in ns2 in aodv, how to create duplicate nodes in ns2, sample code for creation of wireless nodes in ns2, ns2 code for creating nodes in wireless neetwork, coding in java mobile nodes, malicious node in ns2,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  travel agency vb6 0 project report with coding in pdf format 3 3,227 13-03-2018, 12:15 AM
Last Post: Guest
Sad wormhole attack is implemented in ns2 at the network layer 13 4,524 05-05-2017, 01:42 PM
Last Post: neeraj.kuntal90
  ns2 projects for wormhole attack detection with source code free download 8 6,357 15-04-2017, 04:31 PM
Last Post: Guest
  ns2 source code free download broadcast message 1 980 15-04-2017, 02:42 PM
Last Post: jaseela123d
  ant colony optimization ns2 code 1 957 15-04-2017, 01:27 PM
Last Post: jaseela123d
  railway ticket reservation form coding in gui 1 1,298 13-04-2017, 09:45 AM
Last Post: jaseela123d
  sinkhole aodv implementation code in ns2 1 890 10-04-2017, 04:25 PM
Last Post: jaseela123d
  feature extraction from speech using mfcc matlab coding 1 947 07-04-2017, 12:06 PM
Last Post: jaseela123d
  ns2 coding for clone node attack 1 757 04-04-2017, 10:04 AM
Last Post: jaseela123d
  load balancing using ns2 1 746 31-03-2017, 01:55 PM
Last Post: jaseela123d

Forum Jump: