Main Reference PaperOn the vulnerabilities of the virtual force approach to mobile sensor deployment, IEEE Transactions on Mobile Computing, 2014.
  • This paper proposed a method for detection of Opportunistic Movement (OM) attacks in mobile senor network. A virtual force approach is provided the two algorithms, called Density based Random Movement (DRM) and SecureVF. DRM is a simple andlightweight algorithm which exploits to verify the presence of unwanted concentration of devices possibly due to an attack.

+ Description
  • This paper proposed a method for detection of Opportunistic Movement (OM) attacks in mobile senor network. A virtual force approach is provided the two algorithms, called Density based Random Movement (DRM) and SecureVF. DRM is a simple andlightweight algorithm which exploits to verify the presence of unwanted concentration of devices possibly due to an attack.

  • Reducing energy consumption.

  • To increase the lifetime of the sensor nodes.

  • The aim of this project is to detect the OM attacks

+ Aim & Objectives
  • Reducing energy consumption.

  • To increase the lifetime of the sensor nodes.

  • The aim of this project is to detect the OM attacks

  • The proposed schemes do not take into account potential security vulnerabilities and thus are prone to security attacks which need to be further investigated.

+ Contribution
  • The proposed schemes do not take into account potential security vulnerabilities and thus are prone to security attacks which need to be further investigated.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.