Main Reference PaperTraffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs, IEEE Transactions on Mobile Computing, 2016 [NS2].
  • To mitigate the impact of eavesdropping, the study proposes resource-efficient traffic normalization schemes. In comparison to the state-of-the-art, these methods reduce the communication overhead by more than 50%, and the end-to-end delay by more than 30%. To do so, the WSN is partitioned to minimum connected dominating sets that operate in a round-robin fashion. This facilitates reduction of a number of traffic sources active at a given time, while providing routing paths to any node in the WSN. Further, this process helps to reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

+ Description
  • To mitigate the impact of eavesdropping, the study proposes resource-efficient traffic normalization schemes. In comparison to the state-of-the-art, these methods reduce the communication overhead by more than 50%, and the end-to-end delay by more than 30%. To do so, the WSN is partitioned to minimum connected dominating sets that operate in a round-robin fashion. This facilitates reduction of a number of traffic sources active at a given time, while providing routing paths to any node in the WSN. Further, this process helps to reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

  • To mitigate the impact of eavesdropping in proposed resource-efficient traffic normalization schemes.

  • To improve the performance interms of reduced the communication overhead and delay.

+ Aim & Objectives
  • To mitigate the impact of eavesdropping in proposed resource-efficient traffic normalization schemes.

  • To improve the performance interms of reduced the communication overhead and delay.

  • The technique is contributed to further mitigate the impact of eavesdropping in proposed scheme and to improve the performance metrics.

+ Contribution
  • The technique is contributed to further mitigate the impact of eavesdropping in proposed scheme and to improve the performance metrics.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++).

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++).

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.