ABSTRACT:

Compromised-node and denial-of-service are 2 keyattacks in wireless sensor networks (WSNs). In this paper, westudy routing mechanisms that circumvent (bypass) black holesformed by these attacks.We have a tendency to argue that existing multi-path routingapproaches are vulnerable to such attacks, mainly due to theirdeterministic nature. Therefore once an adversary acquires the routingalgorithm, it can compute the identical routes known to the source,and hence endanger all data sent over these routes. In thispaper, we have a tendency to develop mechanisms that generate randomized multipath routes. Under our design, the routes taken by the “shares”of various packets amendment over time. So whether or not the routingalgorithm becomes known to the adversary, the adversary stillcannot pinpoint the routes traversed by each packet. Besidesrandomness, the routes generated by our mechanisms are alsohighly dispersive and energy-ef?cient, creating them quite capableof bypassing black holes at low energy value. Extensive simulationsare conducted to verify the validity of our mechanisms.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry