Catching Packet Droppers and Modifiers in Wireless Sensor Networks

projects 2012 Catching Packet Droppers and Modifiers in Wireless Sensor Networks- projects 2012 ABSTRACT:Catching Packet Droppers and Modifiers in Wireless Sensor Networks- projects 2012 Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis…

Read More

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

projects 2012 Capacity of Data Collection in Arbitrary Wireless Sensor Networks -  projects 2012 Technology Used: Java ABSTRACT:Capacity of Data Collection in Arbitrary Wireless Sensor Networks -  projects 2012 Data collection is a fundamental function provided by wireless sensor networks. How to efficiently collect sensing data from all sensor nodes is critical to the performance of sensor networks. The proposed work aims to understand the theoretical limits of data collection in a TDMA-based sensor network in terms of possible and achievable maximum capacity. Previously, the study of data collection capacity…

Read More

Bounding the Impact of Unbounded Attacks in Stabilization

projects 2012 Bounding the Impact of Unbounded Attacks in Stabilization ABSTRACT:Bounding the Impact of Unbounded Attacks in Stabilization– projects 2012 Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible to contain the spatial impact of Byzantine nodes in a self-stabilizing context for global…

Read More

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Technology Used: Java Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Proposed system localizes a jammer by exploiting neighbor changes.

Read More

Learn to Personalized Image Search from the Photo Sharing Websites

projects 2012 Learn to Personalized Image Search from the Photo Sharing Websites – projects 2012 Abstract:Learn to Personalized Image Search from the Photo Sharing Websites – projects 2012 Technology Used: Java/ J2EE Abstract—Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment medias. The large-scale user-generated meta-data not only facilitate users in sharing and organizing multimedia content,but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating…

Read More

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

projects 2012 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 Abstract:Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts…

Read More

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

projects 2012 Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012 ABSTRACT:Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012 Technology Used: Java The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. SafeQ, a protocol…

Read More

Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters

projects 2012 Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters – projects 2012 Abstract:Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters – projects 2012 Technology Used: Java This load balancer improves both throughput and response time versus a single node, while exposing a single interface to external clients. The algorithm achieves  Transaction Least-Work-Left (TLWL), achieves its performance by integrating several features: knowledge of the SIP protocol; dynamic estimates of back-end server load; distinguishing transactions from calls; recognizing variability in call length; and…

Read More

Router Support for Fine-Grained Latency Measurements

projects 2012 Router Support for Fine-Grained Latency Measurements – projects 2012 Projects 2012 Java Networking Technology Used: Java ABSTRACT An increasing number of datacenter network applications, including automated trading and high-performance computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. The resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP, NetFlow, or active probing. Instrumenting routers with a hash-based primitive has been proposed that called as Lossy Difference Aggregator (LDA) to measure latencies down to tens of microseconds even in the…

Read More

Opportunistic Flow-level Latency Estimation using NetFlow

projects 2012 Opportunistic Flow-level Latency Estimation using NetFlow- projects 2012 Projects 2012 Java Networking Technology Used: Java Abstract—The inherent support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problems where the aggregate behavior within a router appears normal. To address this problem, in this paper, we propose a Consistent NetFlow (CNF) architecture for measuring per-flow performance measurements within routers. CNF utilizes existing NetFlow architecture that already reports the first and last timestamps per-flow, and proposes hash-based sampling to ensure…

Read More