Main Reference PaperLocalized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks,IEEE Transactions on Information Forensics and Security, May 2013.
  • Localized algorithms proposed a method for detection of Node Replication Attacks in mobile senor network. Two replica detection algorithms for mobile sensor networks, XED and EDD, are proposed. Proposed techniques are identified the replica attacks through the random number and location of sensor nodes during the mobility.

+ Description
  • Localized algorithms proposed a method for detection of Node Replication Attacks in mobile senor network. Two replica detection algorithms for mobile sensor networks, XED and EDD, are proposed. Proposed techniques are identified the replica attacks through the random number and location of sensor nodes during the mobility.

  • Reducing the Communication Cost.

  • To reduce the Communication Overhead of the network.

  • To increase the lifetime of the sensor nodes.

+ Aim & Objectives
  • Reducing the Communication Cost.

  • To reduce the Communication Overhead of the network.

  • To increase the lifetime of the sensor nodes.

  • Mechanism to ensure the saving energy is contributed, in which senor node must readjust the transmission range when remaining energy reaches below a threshold. Thus proposed protocol prolongs the lifetime of node.

+ Contribution
  • Mechanism to ensure the saving energy is contributed, in which senor node must readjust the transmission range when remaining energy reaches below a threshold. Thus proposed protocol prolongs the lifetime of node.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.