A Near Optimal Social Network Defence against Sybil Attacks Project Abstract

A Near Optimal Social Network Defense against Sybil attacks project explains about implementing a Sybil guard method for controlling attacks.

Sybil attacks are commonly seen in peer to peer distribution systems when a single user will create multiple fake identities and try to work on it as they were from different nodes.

Because of this attacks genuine users are facing problem in collaborative tasks such as Byzantine failure defense.

This paper proposes a social networking defense method which works on user identities. This method mainly concentrates on trust that is established between users regularly.

If there is a fake account it is hard to maintain trust between users for a long time, based on the graphical view of these results Sybil attack is calculated.

download Near Optimal Social Network Defense against Sybil attacks Project reference documents.

Data Aggregation in Vehicular Ad Hoc Networks Project Abstract

Data Aggregation in Vehicular Ad Hoc Networks project explains about congestion notification for drivers about the traffic surrounded by the vehicle and provide a secure driving option and reduce accidents on highways. 

This application will communicate information of other vehicles speed and diversions they take while traveling, this information will help drivers take precautions. 

Information of vehicles is calculated around 1.6 km range and communicated with every moving car in the form of frames.

This project works on GPS, wireless technology which works at a range of 300 m. Initially users are provided with public and private keys for authenticating with the system.

This paper covers basic operation, Local view, Dissemination, Aging, Security issues, Clustering and compression and conclusion and future work.

download Data Aggregation in vehicular ad hoc networks projects reference documents.

WPANS Security Attacks and Prevention Mechanism Project Abstract

WPANS security Attacks And Prevention Mechanism project explains about implementing a mechanism for reducing risks that occur in the wireless network. 

Wireless networks include Bluetooth, ZigBee, and NFC which comes under IEEE 802.11 standards.

Spoofing, snooping, packet losses are some of the problems that basically occur in wireless networks. In Wireless LAN network there are many drawbacks where there is need to replace with new concepts.

In this paper, we will propose NFC WPANs methods are used to provide security in the wireless network.

download WPANS security attacks and prevention mechanism project reference documents.

Online Mining Maximal Frequent Item Sets Over Data Streams Project Abstract

Online Mining Maximal frequent item sets over data streams projects explain about implementing a DSM-MFI algorithm and its performance of data streaming. 

The data stream is an open ended flow of data elements which are generated continuously at a rapid rate.

In this paper, we explain in detail about one pass algorithm called DSM_MFI which deals with mines maximal frequent.

A detailed explanation of this project is explained in the reference documents.

download Online Mining maximal frequent item sets over data streams project reference documents.

Inside The Permutation – Scanning Worms: Propagation, Modelling And Analysis In Network And Security Project

Description: Inside the Permutation – Scanning Worms: Propagation, Modeling, and Analysis in Network and Security project are about the worm attacking the IP-address of a system connected in LAN connection. 

Using the backend as SQL and how they are linked with the jdk1.5.0 as the frontend. Finally, it recovered and gets the actual IP-Address.

In recent years worm attacks had increased tremendously and caused serious threats on the internet. In order to reduce work effect, we need to understand their propagation patterns for Internet-scale behavior.

This paper covers accurate analytical propagation model to solve this problem.

download Inside the permutation-scanning worms propagation modeling and analysis in network security project reference documents.

Multicast Multipath Power Efficient Routing in a Mobile- Ad hoc Networks Project

Multicast Multipath power efficient routing in a mobile- Adhoc networks projects the main idea is to implement a new approach for networking systems for reducing the power consumption while transmitting packet form source to destination. 

With this new approach, we can increase the efficiency of power usage for real and non real-time data transfer.

In this paper we propose a measurement based routing algorithm for maintaining load balance in intradomain traffic for both multipath and multiple multicast sources. 

The application layer is used for establishing multi-paths. This algorithm will work for different modules where each module had different assumptions on multicasting capabilities of the network.

Multicast Multipath power efficient routing in a mobile- Adhoc networks project reference documents.

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Project

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks projects main idea is to provide quality of service and improve the performance of Ad Hoc Network packet transmission and reduce delay in packet transmission.

Ad hoc networks works don’t need any fixed infrastructure like base stations for its operation. In this technology packet transmission and receiving are addressed by nodes. Ad hoc system works on IEEE 802.11 wireless network standards which is not designed for ad hoc networks but it is used for wireless systems so this standards are not accurately suited to for this system.

Limitations of this system are they work for short ranges mainly on radio communication range so in order to solve this problem in ad hoc network distributed routing protocol is implemented for communication between out of range.

download Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Projects reference docuemt.

Performance Evaluation of BWR Mechanism in MAC 802.16 for WI MAX in Pervasive Computing Environment Using NS-2

Performance evaluation of BWR mechanism in MAC 802.16 for WiMAX in a pervasive computing environment using NS-2 project, aims to analyze the BWR scheme in terms of the delay and throughput; then proposes evaluation to the same scheme. 

We analyze and obtain a formula for the delay incurred and throughput in BWR. In this project, we will analyze the reasons behind the delay in uplink and provide a new approach for dealing with this problem.

WiMAX is one of the widely used broadband services with IEEE standards which works on IEEE 802.16 MAC protocol. Users who use Wimax will request bandwidth through Subscriber station (SS)  to the base station which is called uplink bandwidth allocation.

In this process of bandwidth request (BWR) collision of packets is one of the problems which cause a delay in transmission time and reduce the efficiency of the wireless network.

In order to improve uplink transmission through output new mechanism is implemented called as circularity.

Performance evaluation of BWR mechanism in MAC 802.16 for WiMAX in a pervasive computing environment using NS-2 project reference documents.

Secured Communication in the Next Generation Internet

Secured communication in the next generation internet projects main idea is to describe different factors which are affecting the performance of internet. 

In present situation usage of the internet had increased drastically in each and every field and it had become compulsory in many business dealings and secured information transferring?.

The Internet is used in different devices and information is shared between mobiles and computers and information like multimedia, voice and documents are shared between them which had caused a serious increase in the usage of the network.

As the usage is increased security threats are also increased rapidly which are causing information loss and disrupt business operations.

The main aim of this paper is to discuss major security issues which are faced by network managers in present situation and solutions provided to solve these problems.

Secured communication in the next generation internet projects reference document.

Modeling Network and System Monitoring Over the Internet with Mobile Agents Project

Modeling Network and System Monitoring over the Internet with Mobile Agents project explains about a new approach for distributed network management systems for improving scalability and flexibility compared to that of existing centralized management systems.

As network growth is increasing rapidly there is need to design new network management systems as an alternative to that of existing centralized one by using newly available technologies and programming languages and make them feasible.

In this paper, we propose mobile agent method as an alternative to an existing method which can improve distributed networking systems.

In this concept, we use IBM Aglets and Java-based distributed systems for effective data collection and provides a solution for effective analysis and adaptation to network characteristics.

Modeling network and system monitoring over the internet with mobile agents java project reference documents.