Main Reference PaperHEF Clustering for Secure and Efficient Data Transmission in CWSN, International Journal of Computer Applications, April 2015.
  • In this trust management scheme, trust model takes two methodologies, trust from direct observation methodology and trust from indirect observation method. In direct observation methodology observer node gets trust value by exploiting theorem reasoning. On the other hand, with indirect observation trust value is obtained from neighbor nodes of the observer node. The trust value for this methodology is based on Dempster-Shafer theory. Combining these two trust models, tend to get a lot of correct trust values that results the effectiveness of proposed methodology.

+ Description
  • In this trust management scheme, trust model takes two methodologies, trust from direct observation methodology and trust from indirect observation method. In direct observation methodology observer node gets trust value by exploiting theorem reasoning. On the other hand, with indirect observation trust value is obtained from neighbor nodes of the observer node. The trust value for this methodology is based on Dempster-Shafer theory. Combining these two trust models, tend to get a lot of correct trust values that results the effectiveness of proposed methodology.

  • To guard the data and resources from attacks with minimum computational overhead.

  • To provide feasibleness of the projected theme with relation to the safety necessities and analysis against routing attacks.

+ Aim & Objectives
  • To guard the data and resources from attacks with minimum computational overhead.

  • To provide feasibleness of the projected theme with relation to the safety necessities and analysis against routing attacks.

  • The contributed work can be extended to ensure security in mobile nodes along with the stationary nodes and thereby the scheme gets a wide range of application. The MANETs are usually prone to black hole attacks. Decisions made on the basis of trust calculation method are expected to overcome the shortcomings of OLSR with AODV routing protocol.

+ Contribution
  • The contributed work can be extended to ensure security in mobile nodes along with the stationary nodes and thereby the scheme gets a wide range of application. The MANETs are usually prone to black hole attacks. Decisions made on the basis of trust calculation method are expected to overcome the shortcomings of OLSR with AODV routing protocol.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.