Mobile Computing

Mobile Computing Project Ideas & Topics

  • September 26 2023
  • Bhimsen

Mobile Computing

IEEE mobile computing project list on java based for mtech / MS / be / btech / mca / M.sc students in bangalore.

1.Certificate Revocation in MANET Using clustering

Mobile adhoc network (MANET)is a type of wireless network. It is a open network environment, in other words it is a infrastructure less network. So any node can join and leave in the network freely. Security is the primary concern in the wireless medium. Major functionality of MANET is protecting the data bits which transfer from one node to another node. Because of its dynamic nature MANET is not much secure than wired network. To overcome this problem, cluster based certificate revocation with vindication capability is proposed. In this paper we present the cluster based architecture is used to construct the topology and provide better security for data transfer in MANET

Looking for Project Development Guide ? , Join Our Next Batch for End to end Advise from Experts

 

2.A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information

The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead MANETs suffering from many security vulnerabilities. In this paper, using recent advances
in uncertain reasoning originated from artificial intelligence community, we propose a unified trust management scheme that enhances the security in MANETs. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation.

With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation, also called secondhand information that is obtained from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory, which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method.

Combining these two components in the trust model, we can obtain more accurate trust values of the observed nodes in MANETs. We then evaluate our scheme under the scenario of MANET routing. Extensive simulation results show the effectiveness of the proposed scheme. Specifically, throughput and packet delivery ratio can be improved significantly with slightly increased average end-to- end delay and overhead of messages.

3.Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using uncertain Reasoning

The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead MANETs suffering from many security vulnerabilities. In this paper, using recent advances
in uncertain reasoning originated from artificial intelligence community, we propose a unified trust management scheme that enhances the security in MANETs. In the proposed trust management scheme, the trust model has two components: trust from direct observation and trust from indirect observation.

With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation, also called secondhand information that is obtained from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory, which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method.

Combining these two components in the trust model, we can obtain more accurate trust values of the observed nodes in MANETs. We then evaluate our scheme under the scenario of MANET routing. Extensive simulation results show the effectiveness of the proposed scheme. Specifically, throughput and packet delivery ratio can be improved significantly with slightly increased average end-to- end delay and overhead of messages.

4.A Temporal Packet Marking Detection scheme against MIRA Attack in MANET

Mobile Ad-hoc Network is highly susceptible towards the security attacks due to its dynamic topology, resource constraint, energy constraint operations, limited physical security and lack of infrastructure. Misleading routing attack (MIRA) in MANET intend to delay packet to its fullest in order to generate time outs at the source as packets will not reach in time. Its main objective is to generate delay and increase network overhead. It is a variation to the sinkhole attack.

In this paper, we have proposed a detection scheme to detect the malicious nodes at route discovery as well as at packet transmissions. The simulation results of MIRA attack indicate that though delay is increased by 91.30% but throughput is not affected which indicates that misleading routing attack is difficult to detect. The proposed detection scheme when applied to misleading routing attack suggests a significant decrease in delay.

Share on:

Leave Your Comment Here