Main Reference PaperLightweight authentication protocol used in wireless sensor network, IEEE, 2014.
  • A new and secure protocol based on number theory concepts and congruence equations has been introduced to provide authentication between the sensor nodes and Database Server in a Wireless Network. The proposed protocol uses Chinese Remainder Theorem (CRT)to enable secure communication. The protocol will be using its own encryption and decryption algorithm to reduce the computational complexity

+ Description
  • A new and secure protocol based on number theory concepts and congruence equations has been introduced to provide authentication between the sensor nodes and Database Server in a Wireless Network. The proposed protocol uses Chinese Remainder Theorem (CRT)to enable secure communication. The protocol will be using its own encryption and decryption algorithm to reduce the computational complexity

  • To achieve secure communication in WSN by using the secure keys should be available before a routing protocol starts working.

  • To provide a security mechanism that offers protection against malicious nodes.

  • To prevent the impersonation attack using Chinese Remainder Theorem (CRT).

+ Aim & Objectives
  • To achieve secure communication in WSN by using the secure keys should be available before a routing protocol starts working.

  • To provide a security mechanism that offers protection against malicious nodes.

  • To prevent the impersonation attack using Chinese Remainder Theorem (CRT).

  • The Trust Value based system is contributed to the existing light weight authentication protocol. Initially, the trust value of all node is maintained as high value. If the misbehaving node is detected its trust value can be reduced. This will preserve the authentication.

+ Contribution
  • The Trust Value based system is contributed to the existing light weight authentication protocol. Initially, the trust value of all node is maintained as high value. If the misbehaving node is detected its trust value can be reduced. This will preserve the authentication.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.