Main Reference PaperOn the vulnerabilities of Voronoi-based approaches to mobile sensor deployment, IEEE Transactions on Mobile Computing, 2016 [NS2].
  • The vulnerabilities of Voronoi-based deployment algorithms, gives a geometric characterization of possible attack configurations. Two new secure deployment algorithms called SecureVor and SSD (Secure Swap Deployment), which successfully counteract the OM attack, in different and complementary operative settings is proposed.

+ Description
  • The vulnerabilities of Voronoi-based deployment algorithms, gives a geometric characterization of possible attack configurations. Two new secure deployment algorithms called SecureVor and SSD (Secure Swap Deployment), which successfully counteract the OM attack, in different and complementary operative settings is proposed.

  • To improve the robustness and flexibility, excellent coverage capabilities.

  • To reduce the overhead.

+ Aim & Objectives
  • To improve the robustness and flexibility, excellent coverage capabilities.

  • To reduce the overhead.

  • The technique is contributed to improve the detection accuracy.

+ Contribution
  • The technique is contributed to improve the detection accuracy.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.