Main Reference PaperDefending against Energy Draining attack in Wireless Ad-Hoc Sensor Networks, IJARCST, 2014.
  • One of the major challenge in Wireless Sensor Networks is the security concerns. The attack affecting these networks are increasing as they progress. One of the resources depletion attacks called vampire attacks are the major concern. They not only affect a single node but they bring down the entire system draining the power that is battery power. Proposed system overcomes this challenge by using theEnergy Weight Monitoring Algorithm(EWMA) and the energy consumption is reduced to a great extend. During the route discovery phase, EWMA selects an optimal route by considering a set of parameters including energy, hop count.

+ Description
  • One of the major challenge in Wireless Sensor Networks is the security concerns. The attack affecting these networks are increasing as they progress. One of the resources depletion attacks called vampire attacks are the major concern. They not only affect a single node but they bring down the entire system draining the power that is battery power. Proposed system overcomes this challenge by using theEnergy Weight Monitoring Algorithm(EWMA) and the energy consumption is reduced to a great extend. During the route discovery phase, EWMA selects an optimal route by considering a set of parameters including energy, hop count.

  • It does not completely solve in trust value

  • AODV define no security mechanism

  • AODV had done it basic operation only

+ Aim & Objectives
  • It does not completely solve in trust value

  • AODV define no security mechanism

  • AODV had done it basic operation only

  • Secure Routing process is based on current trust value of nodes and hop count. Hence attacker node which is having low trust value is eliminated from data transmission. High trusted path is selected from the data transmission that leads to reliable data delivery. As trust value is modified based on its capability, efficient router is selected for routing process that improves the network performance

+ Contribution
  • Secure Routing process is based on current trust value of nodes and hop count. Hence attacker node which is having low trust value is eliminated from data transmission. High trusted path is selected from the data transmission that leads to reliable data delivery. As trust value is modified based on its capability, efficient router is selected for routing process that improves the network performance

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.