Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design.
2. ABSTRACT
Data transfer rate is more in
wireless network as compared to
wired network. Wireless network
gives more advantageous because
its support feature such as
versatility, portability, open medium,
simple to design. MANETs and
WSN are the most common forms of
Wireless media. In MANETs nodes
are deployed or distributed in Ad-
hoc way and they are
communicating or exchange
message using wireless
Transmission.
Data transfer rate is more in
wireless network as compared to
wired network. Wireless network
gives more advantageous because
its support feature such as
versatility, portability, open
medium, simple to design. MANETs
and WSN are the most common
forms of Wireless media. In
MANETs nodes are deployed or
distributed in Ad-hoc way and they
are communicating or exchange
message using wireless
Transmission.
2
3. Existing System:
Providing security is very challenging
task in MANETs. There are numerous
IDS has been produced for giving
security. In this area, we
fundamentally portray three exhibited
approaches namely, Watchdog,
TWOACK, and Adaptive
Acknowledgment (AACK).
3
5. ● Marti anticipated method watchdog for detecting misbehaving node
which is Unsafe for network. It operates in two phase first is Watchdog
and second is pathrater. It uses its next hops transmission for detecting
the misbehaving attack which is present in the network. It increases its
failure counter if next node fails to transfer packet within time limit.
Whenever a node’s failure counter surpasses a predefined threshold, the
Watchdog node reports it as misbehaving. The pathrater technique used
for in any future route selections for avoiding the use of malicious node
in the network.
5
7. ● Some of the drawbacks which are present in previous IDS, such as
limited transmission power and receiver collision to avoid these
limitation and to increase the performance of network TWOACK schema
is proposed .It uses three consecutive node to transfer packet from
source to destination.
7
9. ● It consist the combination of TWOACK and TACK. It transfer packet
from the first node to last node. Destination node gives feedback to first
node. It gives the good result than the watchdog and TWOACK. But
drawbacks of the AACK are it is not suitable for when there is number
node in the network is large.
9
13. HYBRID ENCRYPTION AND
DECRYPTION
A hybrid cryptosystem is one which
combines the convenience of a
public-key cryptosystem with the
efficiency of a symmetric-key
cryptosystem. In this project we
are using Triple DES Algorithm is
a symmetric-key cipher, which
applies the DES cipher algorithm
three times to each data block. It is
very easy to modify existing
software to use Triple DES.
13
14. ➜ EAACK gives better performance than other schema.
➜ EAACK uses digital signature it causes routing
Overhead.
➜ Hybrid cryptography to reduce routing overhead by
detecting malicious path. Using shared key source
node and destination node authenticate to transfer
data Packet
Advantages:
14
17. Thanks!
Any questions?
You can find me at:
1croreprojects@gmail.com
•Project Centers in Chennai
•IEEE Project Centers in Chennai
•Realtime Project Centers in Chennai
•Final Year Project Centers in Chennai
17