Main Reference PaperVampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks, IEEE Transactions on Mobile Computing, Feb 2013.
  • This paper demonstrates that secured routing against the vampire attacks. Vampire attacks is a resource consumption attacks that use routing protocols to permanently disable sensor networks by depleting nodes’ battery power. The secured routing can be achieved through the implementation of PLGP techniques and offers the chance to detect vampire attacks by verifying that packets consistently make progress toward their destinations.

+ Description
  • This paper demonstrates that secured routing against the vampire attacks. Vampire attacks is a resource consumption attacks that use routing protocols to permanently disable sensor networks by depleting nodes’ battery power. The secured routing can be achieved through the implementation of PLGP techniques and offers the chance to detect vampire attacks by verifying that packets consistently make progress toward their destinations.

  • To detect the attacker accurately without accusing a legitimate node as attacker.

  • Proposed Protocols should achieve the security under hostile and suspicious scenarios.

+ Aim & Objectives
  • To detect the attacker accurately without accusing a legitimate node as attacker.

  • Proposed Protocols should achieve the security under hostile and suspicious scenarios.

  • An Enhanced PLGP defenses against the vampire attacks in the mobile network is contributed.

+ Contribution
  • An Enhanced PLGP defenses against the vampire attacks in the mobile network is contributed.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.