Main Reference PaperAn Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks, International Journal of Computer Applications, July 2014.
  • Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which cause DDoS. There is a requirement for the detection of these attacks rapidly and perfectly. For detection of these attacks, this proposed scheme suggests an efficient method.

+ Description
  • Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which cause DDoS. There is a requirement for the detection of these attacks rapidly and perfectly. For detection of these attacks, this proposed scheme suggests an efficient method.

  • To detect using efficient method

  • To improve the energy efficiency

+ Aim & Objectives
  • To detect using efficient method

  • To improve the energy efficiency

  • Authentication can be provided by both sender and receiver of data need to be sure of each other’s identity. Confidentiality ensures that the intended receivers can only access the transmitted data. The authorized user keeps the information sent unreadable tounauthorized users or nodes.

+ Contribution
  • Authentication can be provided by both sender and receiver of data need to be sure of each other’s identity. Confidentiality ensures that the intended receivers can only access the transmitted data. The authorized user keeps the information sent unreadable tounauthorized users or nodes.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.