Main Reference PaperA Decentralized Key management scheme via neighborhood prediction in Mobile Wireless Network,2013.
  • This paper deals with, Decentralized Key Management Scheme , this paper proposes correlation aware scheme , while sharing the key it will considers the mobility of the other mobile nodes which will move with mobile node which is going to share key with other nodes in the network. So it improves key sharing and key reconstruction percentage while reconstructing the key.

+ Description
  • This paper deals with, Decentralized Key Management Scheme , this paper proposes correlation aware scheme , while sharing the key it will considers the mobility of the other mobile nodes which will move with mobile node which is going to share key with other nodes in the network. So it improves key sharing and key reconstruction percentage while reconstructing the key.

  • To provide the cryptography based Key Sharing Method in the mobile environment.

  • To reduce the Communication overhead.

  • To support the Data Storage in the distributed environment.

  • To improve Key Reconstruction Percentage while reconstruction of keys.

+ Aim & Objectives
  • To provide the cryptography based Key Sharing Method in the mobile environment.

  • To reduce the Communication overhead.

  • To support the Data Storage in the distributed environment.

  • To improve Key Reconstruction Percentage while reconstruction of keys.

  • The trust relationship between the nodes to be considered to improve the secure key management system. The proposed system provides the additional security to the system to perform the effective key sharing in the mobile environment. This contributes one method that is Trust evaluation Method, that improves the security of the key sharing and key management by considering trust is also one of the factor. So the trusted node only considered while key sharing.

+ Contribution
  • The trust relationship between the nodes to be considered to improve the secure key management system. The proposed system provides the additional security to the system to perform the effective key sharing in the mobile environment. This contributes one method that is Trust evaluation Method, that improves the security of the key sharing and key management by considering trust is also one of the factor. So the trusted node only considered while key sharing.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.