NS2 Projects

Abstract:

WSNs are essential to the IoT. WSN sensors monitor harsh environments randomly. WSNs can be intercepted by global and local adversaries if they only use content protection mechanisms. WSN context privacy is crucial because an attacker can use contextual data to find the source or sink.

WSN transmits sensitive data in many applications. To protect sensitive data, the adversary must be prevented from breaching and revealing the source and sink. The adversary could easily locate nodes by capturing frames and discovering the source and destination addresses.

Previous works focused on routing-level protection. This paper proposes the Counterfeit Clones (CC) scheme to protect nodes’ data link layer location privacy by hiding the MAC address with a lightweight one-way hash function.

To hide source and destination nodes, routing uses fake sources and sinks. Performance analysis shows that the CC technique has a longer safety time and lower energy consumption than other solutions. CC can increase safety time and protect source and sink location privacy with faster packet transmission to the base station than other algorithms.

Keywords : Wireless Sensor Networks, Privacy, Sensors, Cloning, Base Stations, Security, Safety, Data Privacy, Internet Of Things, Radio Links, Telecommunication Security, Wireless Sensor Networks

Note: Please discuss with our team before submitting this abstract to the college. This Abstract or Synopsis varies based on student project requirements.

Did you like this final year project?

To download this project Code with thesis report and project training... Click Here

You may also like: