Main Reference PaperOptimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, August 2010.
  • This project demonstrates that the structure of the Jamming problem in WSN. It aims at improve the effect of the attack and exposing the attacker to detection. The attacker attempts to find an Optimal trade-off between the severity of the attack and the extent to which it becomes detectable.

+ Description
  • This project demonstrates that the structure of the Jamming problem in WSN. It aims at improve the effect of the attack and exposing the attacker to detection. The attacker attempts to find an Optimal trade-off between the severity of the attack and the extent to which it becomes detectable.

  • To derive the Optimal Jamming Attack and optimal defense strategies as solutions to optimization problems those are faced by the attacker and the network

+ Aim & Objectives
  • To derive the Optimal Jamming Attack and optimal defense strategies as solutions to optimization problems those are faced by the attacker and the network

  • Voting protocol can be used to find the malicious node. The voting protocol requires that each node keep watch over its neighbors’ behavior in each broadcast, so that when a jamming is detected, the base station could poll the nodes near the boundary of the victim region.

+ Contribution
  • Voting protocol can be used to find the malicious node. The voting protocol requires that each node keep watch over its neighbors’ behavior in each broadcast, so that when a jamming is detected, the base station could poll the nodes near the boundary of the victim region.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.