Main Reference PaperClustering based Data Collection using Data Fusion in Wireless Sensor Networks, International Journal of Computer Applications, April 2015.
  • Proposed work uses reputation and trust table for security. Reputation creates the opinion of neighbor node and trust creates the expectation of neighbor node. Each cluster separately builds and maintains this reputation and trust table because, it is very difficult to build and maintain a reputation and trust system for whole network. The reputation and trust based systems for WSNs use one of the three following methods to share information among the nodes: friends list, blacklist, and reputation table. Positive informations are shared in a friends list, negative informations are shared in a blacklist, while a reputation table is shared both positive and negative information.

+ Description
  • Proposed work uses reputation and trust table for security. Reputation creates the opinion of neighbor node and trust creates the expectation of neighbor node. Each cluster separately builds and maintains this reputation and trust table because, it is very difficult to build and maintain a reputation and trust system for whole network. The reputation and trust based systems for WSNs use one of the three following methods to share information among the nodes: friends list, blacklist, and reputation table. Positive informations are shared in a friends list, negative informations are shared in a blacklist, while a reputation table is shared both positive and negative information.

  • To secure and accurate data fusion in wireless sensor networks.

  • To identify and delete the compromised sensor nodes.

  • To reduce the traffic load and to conserve energy of the sensors.

+ Aim & Objectives
  • To secure and accurate data fusion in wireless sensor networks.

  • To identify and delete the compromised sensor nodes.

  • To reduce the traffic load and to conserve energy of the sensors.

  • A technique is contributed to retrieve the collective information from the sink. DSR-Destination Source Routing protocol is used for reducing the data loss.

+ Contribution
  • A technique is contributed to retrieve the collective information from the sink. DSR-Destination Source Routing protocol is used for reducing the data loss.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.