SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
STARS: A Statistical Traffic Pattern Discovery System 
for MANETs 
ABSTRACT: 
Many anonymity enhancing techniques have been proposed based on packet encryption to protect 
the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we 
show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To 
demonstrate how to discover the communication patterns without decrypting the captured 
packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works 
passively to perform traffic analysis based on statistical characteristics of captured raw traffic. 
STARS is capable of discovering the sources, the destinations, and the end-to-end communication 
relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the 
hidden traffic patterns. 
EXISTING SYSTEM: 
Evidence-based statistical traffic analysis model, every captured packet is treated as evidence 
supporting a point-to-point (one-hop) transmission between the sender and the receiver. A 
sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end 
(multihop) relations. This approach provides a practical attacking framework against MANETs 
but still leaves substantial information about the communication patterns undiscovered. MANET 
systems can achieve very restricted communication anonymity under the attack of STARS.
Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., 
attackers only need toc ollect information and perform analysis quietly without changing the 
network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure 
attacks are two representatives. 
However, all these previous approaches do not work well to analyze MANET traffic because of the 
following three natures of MANETs: 
1) The broadcasting nature: In wired networks, a point -to-point message transmission usually has 
only one possible receiver. While in wireless networks, a message is broadcasted, which can have 
multiple possible receivers and so in curs additional uncertainty. 
2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as 
both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a 
source, a destination, or just a relay. 
3) The mobile nature: Most of existing traffic analysis models does not take into consideration the 
mobility of communication peers, which make the communication relations among mobile nodes 
more complex. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Approaches do not work well to analyze MANET traffic. 
 The scheme fails to address several important constrains when deriving the end-to-end traffic from the one 
hop evidences. 
 It does not provide a method to identify the actual source and destination nodes (or to calculate the 
source/destination probability distribution). 
 Most of the previous approaches are partial attacks in the sense that they either only try to identify the 
source (or destination) nodes or to find out the corresponding destination (source) nodes for given 
particular source (destination) nodes. 
PROPOSED SYSTEM: 
 We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to 
capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted 
packets. 
 From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the 
end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic 
patterns from the end-to-end matrix. 
 In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to 
derive the source/destination probability distribution, i.e., the probability for each node to be a message
source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair 
ofnodes to be an end-to-end communication pair. 
 To achieve its goals, STARS includes two major steps: 
1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the 
end-to-end traffic matrix with a set of traffic filtering rules; and 
2) Apply a heuristic approach to identify the actual source and destination nodes, and then 
correlate the source nodes with their corresponding destinations. 
ADVANTAGES OF PROPOSED SYSTEM: 
The attacker can take advantage of STARS to perform traffic analysis as follows: 
 Divide the entire network into multiple regions geographically; 
 Deploy sensors along the boundaries of each region 
 To monitor the cross-component traffic; 
 Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end 
communication relations; and 
 Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. 
SYSTEM ARCHITECTURE: 
WORK FLOW: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 44 Mb. 
 Monitor : 15 VGA Colour. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7/LINUX. 
 Implementation : NS2 
 NS2 Version : 2.28 
 Front End : OTCL (Object Oriented Tool Command Language) 
 Tool : Cygwin (To simulate in Windows OS) 
REFERENCE: 
Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for 
MANETs,” MARCH/APRIL 2014.

More Related Content

What's hot

D021203019025
D021203019025D021203019025
D021203019025theijes
 
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...IOSR Journals
 
Information Extraction
Information ExtractionInformation Extraction
Information Extractionssbd6985
 
Consensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed trackingConsensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed trackingieeeprojectsbangalore
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressAarhus University
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNIJARIIT
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Papitha Velumani
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Segmentation of Machine learning Algorithm
Segmentation of Machine learning AlgorithmSegmentation of Machine learning Algorithm
Segmentation of Machine learning AlgorithmBathshebaparimala
 

What's hot (12)

D021203019025
D021203019025D021203019025
D021203019025
 
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
 
Information Extraction
Information ExtractionInformation Extraction
Information Extraction
 
Consensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed trackingConsensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed tracking
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progress
 
Connectivity
ConnectivityConnectivity
Connectivity
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Segmentation of Machine learning Algorithm
Segmentation of Machine learning AlgorithmSegmentation of Machine learning Algorithm
Segmentation of Machine learning Algorithm
 

Similar to IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic pattern discovery system for manets

Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETKishan Patel
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnIOSR Journals
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...IOSR Journals
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...ijwmn
 
Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsJPINFOTECH JAYAPRAKASH
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147IJRAT
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 

Similar to IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic pattern discovery system for manets (20)

Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Mphasisintern
MphasisinternMphasisintern
Mphasisintern
 
Manet
ManetManet
Manet
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
 
Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane ts
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 

More from IEEEBEBTECHSTUDENTPROJECTS

IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS  Temporal traffic dynamics improve the conn...IEEE 2014 NS2 NETWORKING PROJECTS  Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS  Proportional fair coding for wireless mesh...IEEE 2014 NS2 NETWORKING PROJECTS  Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS  Optical networking with variable code-rate...IEEE 2014 NS2 NETWORKING PROJECTS  Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS  Fast regular expression matching using sma...IEEE 2014 NS2 NETWORKING PROJECTS  Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS  Distributed detection in mobile access wir...IEEE 2014 NS2 NETWORKING PROJECTS  Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEEBEBTECHSTUDENTPROJECTS
 

More from IEEEBEBTECHSTUDENTPROJECTS (20)

IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS  Temporal traffic dynamics improve the conn...IEEE 2014 NS2 NETWORKING PROJECTS  Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
 
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS  Proportional fair coding for wireless mesh...IEEE 2014 NS2 NETWORKING PROJECTS  Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
 
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS  Optical networking with variable code-rate...IEEE 2014 NS2 NETWORKING PROJECTS  Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
 
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS  Fast regular expression matching using sma...IEEE 2014 NS2 NETWORKING PROJECTS  Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
 
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS  Distributed detection in mobile access wir...IEEE 2014 NS2 NETWORKING PROJECTS  Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
 
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...IEEE 2014 NS2 NETWORKING PROJECTS  Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...IEEE 2014 NS2 NETWORKING PROJECTS  Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
 
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...IEEE 2014 NS2 NETWORKING PROJECTS  Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...IEEE 2014 NS2 NETWORKING PROJECTS  Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...IEEE 2014 NS2 NETWORKING PROJECTS  Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...IEEE 2014 NS2 NETWORKING PROJECTS  A hybrid hardware architecture for high sp...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapesIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learningIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Recently uploaded (20)

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic pattern discovery system for manets

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com STARS: A Statistical Traffic Pattern Discovery System for MANETs ABSTRACT: Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To demonstrate how to discover the communication patterns without decrypting the captured packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works passively to perform traffic analysis based on statistical characteristics of captured raw traffic. STARS is capable of discovering the sources, the destinations, and the end-to-end communication relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the hidden traffic patterns. EXISTING SYSTEM: Evidence-based statistical traffic analysis model, every captured packet is treated as evidence supporting a point-to-point (one-hop) transmission between the sender and the receiver. A sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end (multihop) relations. This approach provides a practical attacking framework against MANETs but still leaves substantial information about the communication patterns undiscovered. MANET systems can achieve very restricted communication anonymity under the attack of STARS.
  • 2. Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., attackers only need toc ollect information and perform analysis quietly without changing the network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure attacks are two representatives. However, all these previous approaches do not work well to analyze MANET traffic because of the following three natures of MANETs: 1) The broadcasting nature: In wired networks, a point -to-point message transmission usually has only one possible receiver. While in wireless networks, a message is broadcasted, which can have multiple possible receivers and so in curs additional uncertainty. 2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a source, a destination, or just a relay. 3) The mobile nature: Most of existing traffic analysis models does not take into consideration the mobility of communication peers, which make the communication relations among mobile nodes more complex. DISADVANTAGES OF EXISTING SYSTEM:  Approaches do not work well to analyze MANET traffic.  The scheme fails to address several important constrains when deriving the end-to-end traffic from the one hop evidences.  It does not provide a method to identify the actual source and destination nodes (or to calculate the source/destination probability distribution).  Most of the previous approaches are partial attacks in the sense that they either only try to identify the source (or destination) nodes or to find out the corresponding destination (source) nodes for given particular source (destination) nodes. PROPOSED SYSTEM:  We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted packets.  From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic patterns from the end-to-end matrix.  In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to derive the source/destination probability distribution, i.e., the probability for each node to be a message
  • 3. source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair ofnodes to be an end-to-end communication pair.  To achieve its goals, STARS includes two major steps: 1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the end-to-end traffic matrix with a set of traffic filtering rules; and 2) Apply a heuristic approach to identify the actual source and destination nodes, and then correlate the source nodes with their corresponding destinations. ADVANTAGES OF PROPOSED SYSTEM: The attacker can take advantage of STARS to perform traffic analysis as follows:  Divide the entire network into multiple regions geographically;  Deploy sensors along the boundaries of each region  To monitor the cross-component traffic;  Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end communication relations; and  Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. SYSTEM ARCHITECTURE: WORK FLOW: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : 2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for MANETs,” MARCH/APRIL 2014.