Main Reference PaperLightweight Location Verification Algorithms for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, May 2013.
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]WIRELESS SENSOR NETWORKS[/dt_list_item][/dt_list]
Research Area of the Project
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]WIRELESS SENSOR NETWORKS[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]The location verification for WSN contains two algorithms such as On Spot and In –Region Verification algorithms. Proposed algorithms are detecting the abnormal location by exploring the inconsistency between the sensor location and neighborhood observation. This Verification algorithm should be lightweight in terms of hardware cost and computation overhead.[/dt_list_item][/dt_list]
Description
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]The location verification for WSN contains two algorithms such as On Spot and In –Region Verification algorithms. Proposed algorithms are detecting the abnormal location by exploring the inconsistency between the sensor location and neighborhood observation. This Verification algorithm should be lightweight in terms of hardware cost and computation overhead.[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]The Verification Algorithm is robust against the Malicious Attacks that are launched during the verification process.[/dt_list_item][dt_list_item image=””]To achieves high detection rate with low false positive rate by using a good verification algorithm.[/dt_list_item][dt_list_item image=””]The verification system can be applied to any Low-Cost Wireless Sensor Networks.[/dt_list_item][/dt_list]
Aim & Objectives
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]The Verification Algorithm is robust against the Malicious Attacks that are launched during the verification process.[/dt_list_item][dt_list_item image=””]To achieves high detection rate with low false positive rate by using a good verification algorithm.[/dt_list_item][dt_list_item image=””]The verification system can be applied to any Low-Cost Wireless Sensor Networks.[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]Along with the location verification algorithm, distributed in Region Verification Algorithm is also contributed. So that sensor node reports the location information corresponding verification center. Thus proposed technique improved on prolongs the lifetime of sensor nodes, collision avoidance and achieve the high detection accuracy.[/dt_list_item][/dt_list]
Contribution
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]Along with the location verification algorithm, distributed in Region Verification Algorithm is also contributed. So that sensor node reports the location information corresponding verification center. Thus proposed technique improved on prolongs the lifetime of sensor nodes, collision avoidance and achieve the high detection accuracy.[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.[/dt_list_item][dt_list_item image=””]Simulator: NS 2.35, Language : TCL and AWK script, (C++)[/dt_list_item][/dt_list]
Software Tools & Technologies
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.[/dt_list_item][dt_list_item image=””]Simulator: NS 2.35, Language : TCL and AWK script, (C++)[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.[/dt_list_item][/dt_list]
Project Recommended For
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.[/dt_list_item][/dt_list]
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]No Readymade Projects-Depending on the complexity of the project and requirements[/dt_list_item][/dt_list]
Order To Delivery
[dt_list style=”1″ bullet_position=”middle” dividers=”true”][dt_list_item image=””]No Readymade Projects-Depending on the complexity of the project and requirements[/dt_list_item][/dt_list]

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.