Main Reference Paper Are We Really Close? Verifying Proximity in Wireless Systems, IEEE Security & Privacy, June 2017 [NS2].
  • This work aims at analyzing the current proximity verification against the distance modification attacks. Moreover, the security defense systems are analyzed against resilience against cyber-physical attacks.

+ Description
  • This work aims at analyzing the current proximity verification against the distance modification attacks. Moreover, the security defense systems are analyzed against resilience against cyber-physical attacks.

  • To analyze the proximity verification techniques against distance modification attacks.

  • To analyze Time-of-flight based distance estimation methods against cyber-physical attacks.

+ Aim & Objectives
  • To analyze the proximity verification techniques against distance modification attacks.

  • To analyze Time-of-flight based distance estimation methods against cyber-physical attacks.

  • A technique is contributed to reduce the complexity of overall system.

+ Contribution
  • A technique is contributed to reduce the complexity of overall system.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language: TCL and AWK script, (C++).

+ Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language: TCL and AWK script, (C++).

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.