Main Reference PaperTraffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs, IEEE Transactions on Mobile Computing, 2016 [NS2].
  • To mitigate the impact of eavesdropping, the study proposes resource-efficient traffic normalization schemes. In comparison to the state-of-the-art, these methods reduce the communication overhead by more than 50%, and the end-to-end delay by more than 30%. To do so, the WSN is partitioned to minimum connected dominating sets that operate in a round-robin fashion. This facilitates reduction of a number of traffic sources active at a given time, while providing routing paths to any node in the WSN. Further, this process helps to reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

Description
  • To mitigate the impact of eavesdropping, the study proposes resource-efficient traffic normalization schemes. In comparison to the state-of-the-art, these methods reduce the communication overhead by more than 50%, and the end-to-end delay by more than 30%. To do so, the WSN is partitioned to minimum connected dominating sets that operate in a round-robin fashion. This facilitates reduction of a number of traffic sources active at a given time, while providing routing paths to any node in the WSN. Further, this process helps to reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

  • To mitigate the impact of eavesdropping in proposed resource-efficient traffic normalization schemes.

  • To improve the performance interms of reduced the communication overhead and delay.

Aim & Objectives
  • To mitigate the impact of eavesdropping in proposed resource-efficient traffic normalization schemes.

  • To improve the performance interms of reduced the communication overhead and delay.

  • The technique is contributed to further mitigate the impact of eavesdropping in proposed scheme and to improve the performance metrics.

Contribution
  • The technique is contributed to further mitigate the impact of eavesdropping in proposed scheme and to improve the performance metrics.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++).

Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++).

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.