Main Reference PaperSecure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, January-February 2015.
  • The data aggregation process make the wireless sensor network is vulnerable to wormhole attack. This work proposes the distributed wormhole attacker detection mechanism that improves the detection accuracy using iteration filtering mechanism. Providing initial approximation to the sensor nodes’ trustworthiness makes the proposed algorithm as collusion robust with faster converging.

+ Description
  • The data aggregation process make the wireless sensor network is vulnerable to wormhole attack. This work proposes the distributed wormhole attacker detection mechanism that improves the detection accuracy using iteration filtering mechanism. Providing initial approximation to the sensor nodes’ trustworthiness makes the proposed algorithm as collusion robust with faster converging.

  • To detect the wormhole attack and reduce the false aggregated data in wireless sensor network

  • To improve the performance of iteration filtering algorithm against wormhole attack

+ Aim & Objectives
  • To detect the wormhole attack and reduce the false aggregated data in wireless sensor network

  • To improve the performance of iteration filtering algorithm against wormhole attack

  • In order to reduce the complexity of wormhole detection, balance the number of iterations and detection accuracy

+ Contribution
  • In order to reduce the complexity of wormhole detection, balance the number of iterations and detection accuracy

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.