Main Reference PaperOptimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security, March 2014.
  • This paper demonstrates that data confidentiality in the presence of passive eavesdropping. An eavesdropping fusion center (EFC) is attempting to intercept the sensor’s messages and to detect the state of nature. To protect their data against EFC, the sensors encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor’s data to another quantizer output level using astochastic cipher matrix (key).

+ Description
  • This paper demonstrates that data confidentiality in the presence of passive eavesdropping. An eavesdropping fusion center (EFC) is attempting to intercept the sensor’s messages and to detect the state of nature. To protect their data against EFC, the sensors encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor’s data to another quantizer output level using astochastic cipher matrix (key).

  • Low communication overhead

  • To increase the network lifetime

+ Aim & Objectives
  • Low communication overhead

  • To increase the network lifetime

  • The proposed schemes do not considered the saving energy, Transmission range adjustment protocol is executed so that to conserve energy.

+ Contribution
  • The proposed schemes do not considered the saving energy, Transmission range adjustment protocol is executed so that to conserve energy.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.