Main Reference PaperA light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks, IJECS, 2014.
  • The motivation of a large portion of research efforts has been to maximize the network lifetime, where the lifetime of network is measured from the instant of deployment to the point when one of the nodes has exhausted its limited power source and becomes in operational commonly referred as first node failure. But there is a class of resource consumption attack called vampire attack which permanently disables the whole network by quickly draining nodes battery. In this novel approach, forwarding as well as discovery phase of the protocol are considered to avoid attack. Here algorithm overhead is reduced and discovery phase is considered to avoid vampire attack.

+ Description
  • The motivation of a large portion of research efforts has been to maximize the network lifetime, where the lifetime of network is measured from the instant of deployment to the point when one of the nodes has exhausted its limited power source and becomes in operational commonly referred as first node failure. But there is a class of resource consumption attack called vampire attack which permanently disables the whole network by quickly draining nodes battery. In this novel approach, forwarding as well as discovery phase of the protocol are considered to avoid attack. Here algorithm overhead is reduced and discovery phase is considered to avoid vampire attack.

  • To improve the energy efficiency and improve the network lifetime

  • To improve security

+ Aim & Objectives
  • To improve the energy efficiency and improve the network lifetime

  • To improve security

  • Confidentiality ensures that the intended receivers can only access the transmitted data. The authorized user keeps the information sent unreadable to unauthorized users or nodes. To keep the information is confidential, the source, intermediate nodes and receiver uses thenode- specific broadcast key value for encryption and decryption. The node-specific broadcast key values know to all authenticated nodes. It requires that the sender find some secure way to deliver the encryption/decryption key to the receiver.

+ Contribution
  • Confidentiality ensures that the intended receivers can only access the transmitted data. The authorized user keeps the information sent unreadable to unauthorized users or nodes. To keep the information is confidential, the source, intermediate nodes and receiver uses thenode- specific broadcast key value for encryption and decryption. The node-specific broadcast key values know to all authenticated nodes. It requires that the sender find some secure way to deliver the encryption/decryption key to the receiver.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.