Catching Packet Droppers and Modifiers in Wireless Sensor Networks

projects 2012 Catching Packet Droppers and Modifiers in Wireless Sensor Networks- projects 2012 ABSTRACT:Catching Packet Droppers and Modifiers in Wireless Sensor Networks- projects 2012 Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis…

Read More

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

projects 2012 Capacity of Data Collection in Arbitrary Wireless Sensor Networks -  projects 2012 Technology Used: Java ABSTRACT:Capacity of Data Collection in Arbitrary Wireless Sensor Networks -  projects 2012 Data collection is a fundamental function provided by wireless sensor networks. How to efficiently collect sensing data from all sensor nodes is critical to the performance of sensor networks. The proposed work aims to understand the theoretical limits of data collection in a TDMA-based sensor network in terms of possible and achievable maximum capacity. Previously, the study of data collection capacity…

Read More

Cut Detection in Wireless Sensor Networks

projects 2012 Cut Detection in Wireless Sensor Networks – projects 2012 ABSTRACT:Cut Detection in Wireless Sensor Networks – projects 2012 A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) one or…

Read More

Bounding the Impact of Unbounded Attacks in Stabilization

projects 2012 Bounding the Impact of Unbounded Attacks in Stabilization ABSTRACT:Bounding the Impact of Unbounded Attacks in Stabilization– projects 2012 Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible to contain the spatial impact of Byzantine nodes in a self-stabilizing context for global…

Read More

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Technology Used: Java Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Proposed system localizes a jammer by exploiting neighbor changes.

Read More

Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks

projects 2012 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks – projects 2012 Abstract:Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks- projects 2012 Technology Used: Java AIM Minimizing energy consumption in battery-operated mobile devices is essential for the development of next generation heterogeneous wireless communications systems. In this work, we develop optimized flow selection and resource allocation schemes that can provide end-to-end statistical delay bounds and minimized energy consumption for video distribution over cooperative wireless networks. ABSTRACT For real-time video broadcast where multiple users…

Read More

Learn to Personalized Image Search from the Photo Sharing Websites

projects 2012 Learn to Personalized Image Search from the Photo Sharing Websites – projects 2012 Abstract:Learn to Personalized Image Search from the Photo Sharing Websites – projects 2012 Technology Used: Java/ J2EE Abstract—Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment medias. The large-scale user-generated meta-data not only facilitate users in sharing and organizing multimedia content,but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating…

Read More

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

projects 2012 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 Abstract:Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts…

Read More

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

projects 2012 Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012 ABSTRACT:Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012 Technology Used: Java The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. SafeQ, a protocol…

Read More

Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters

projects 2012 Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters – projects 2012 Abstract:Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters – projects 2012 Technology Used: Java This load balancer improves both throughput and response time versus a single node, while exposing a single interface to external clients. The algorithm achieves  Transaction Least-Work-Left (TLWL), achieves its performance by integrating several features: knowledge of the SIP protocol; dynamic estimates of back-end server load; distinguishing transactions from calls; recognizing variability in call length; and…

Read More