Main Reference PaperAn Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension, IEEE Internet of Things Journal, October 2014.
  • A new scheme, called path extension method (PEM) is proposed to provide strong protection for source-location privacy. It performs quite well even though an object occurs near the base station, while other methods cannot protect the source well in this case. In PEM, fake sources are generated dynamically after the source sends event messages to the base station, which makes it much more flexible.

+ Description
  • A new scheme, called path extension method (PEM) is proposed to provide strong protection for source-location privacy. It performs quite well even though an object occurs near the base station, while other methods cannot protect the source well in this case. In PEM, fake sources are generated dynamically after the source sends event messages to the base station, which makes it much more flexible.

  • To improve the source location privacy using fake sources that are generated dynamically.

  • To increase the throughput with reduced message delivery delay and maintain acceptable overhead using the fake sources.

  • To increase the network lifetime through balanced energy consumption and safety period.

+ Aim & Objectives
  • To improve the source location privacy using fake sources that are generated dynamically.

  • To increase the throughput with reduced message delivery delay and maintain acceptable overhead using the fake sources.

  • To increase the network lifetime through balanced energy consumption and safety period.

  • Source location privacy protocol is enhanced with energy efficient selection of fake sources in round robin manner to balance the energy consumption. Hence number of dead nodes reduces in the network which increases network lifetime.

+ Contribution
  • Source location privacy protocol is enhanced with energy efficient selection of fake sources in round robin manner to balance the energy consumption. Hence number of dead nodes reduces in the network which increases network lifetime.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.