Main Reference PaperTraffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks, International Journal of Computer Applications, July 2014.
  • Sensor networks suffer from several constraints such as limited energy,storage capacity and computing power which make it impossible to take advantage of an overwhelming proportion of tested, evaluated and improved mechanisms which are used in computer networks. To detect the un compromised nodes using Kalman filter.To detect the attacks and abnormal conditions can be marked using Kalman filter.

+ Description
  • Sensor networks suffer from several constraints such as limited energy,storage capacity and computing power which make it impossible to take advantage of an overwhelming proportion of tested, evaluated and improved mechanisms which are used in computer networks. To detect the un compromised nodes using Kalman filter.To detect the attacks and abnormal conditions can be marked using Kalman filter.

  • To detect the un compromised nodes using Kalman filter

  • To detect the attacks and abnormal conditions can be marked using Kalman filter

+ Aim & Objectives
  • To detect the un compromised nodes using Kalman filter

  • To detect the attacks and abnormal conditions can be marked using Kalman filter

  • An Enhanced Kalman filter can estimate the network parameters in the mobile sensor network is contributed.

+ Contribution
  • An Enhanced Kalman filter can estimate the network parameters in the mobile sensor network is contributed.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.