You are on page 1of 10

TITLE OF THE PROJECT

A MAJOR PROJECT
Submitted in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
IN
NAME OF DEPARTMENT

Submitted by

Name of Student
(Roll No of Student)
Under the Guidance of

Assistant Prof. XXXXXXXXXXXXXXXXX

Department of Name

School of Engineering & Technology

ITM UNIVERSITY GWALIOR, (M.P.), INDIA

2011-2015
BLACKHOLE TITLE (Center align, Bold,Times New
Roman 18)
A MAJOR PROJECT (Center align, Bold,Times New Roman 14)
Submitted in partial fulfillment for the award of the degree of (Itallic,
Bold, Times New Roman 14)

BACHELOR OF TECHNOLOGY (Center align, Bold,Times


New Roman 16)
IN
COMPUTER SCIENCE & ENGINEERING

Submitted by (Center align, Ittalic, Bold,Times New Roman 14)

Hemant Sharma (Center align, Bold,Times New Roman 16)


(MCSN1CS12012) (Center align, Bold,Times New Roman 16)
Under the guidance of (Center align, Bold,Times New Roman 14)

Assistant Prof. XXXXXXXXXXXXXXXXX (Center align,


Bold, Times New Roman 16)
Department of Computer Science & Engineering (Center align,
Bold, Times New Roman 16)
School of Engineering & Technology (Center align,
Bold, Times New Roman 18)

ITM UNIVERSITY GWALIOR, MP, INDIA (Center


align, Bold, Times New Roman 18)

2011-2015
CERTIFICATE

This is to certify that the work titled Project Name submitted by Name of student
(Roll No.) in partial fulfilment for the award of degree of B. Tech. (NAME OF
DEPARTMENT), ITM University Gwalior has been carried out under my/our
supervision.

To the best of my knowledge and belief, the Project

(i) has duly been completed.

(ii) is up to the standard both in respect of contents and language.

(iii) fulfils the requirement of the ordinance relating to B.Tech. degree of the University.

Date:

Prof. Name of Supervisor


Name of Department
ITM University Gwalior

Head Dean

Name of Department School of Engineering & Technology


DECLARATION

I do hereby declare that the work titled (Name of the Project) submitted to the
(NAME of Department), School of Engineering & Technology, ITM University
Gwalior, is my original work and have not been submitted to any other
University/Institute for award of any degree.

(Name of Student)

(Roll No.)
ACKNOWLEDGEMENT
(sample copy)

I am highly indebted towards my guide, respected--------------------------- (name of


guide) ----------- (designation) -------------------------- (department).

He despite of being awfully busy always spared his valuable time, for supervising
project work, presentation of the results and guiding me in this work

I extend all my thanks to my H.O.D--------------- (Name) -------- (department) for


constantly encouraging and guiding me.

I am highly thankful to Dr. Ranjeet Singh Tomar, Dean, school of engineering &
technology for extending all support,

I wish to place on records, my deep sense of gratitude and sincere thanks to Prof.
Vandana Kushwah Vice Chancellor ITM University Gwalior for encouraging me for the
same.

I am highly indebted towards faculty members of my department for extending all


help and support for completion of this work

And above all to my all family members, respected parents for continuously
encouraging me for this work and bearing all related difficulties.

(Name & signature of student)

Roll no---
LIST OF CONTENTS
Acknowledgement iv

List of Figures v

List of Tables vi

Acronyms vii

1. Introduction 1

1.1 VANET Characteristics 2


1.1.1 High Mobility and Predictable Topology 2
1.1.2 Hard Delay Constraints 2
1.2 VANET Architecture 4
1.3 VANET Standards 5
1.4 VANET Problems 7

2. Literature Review 15

2.1 Privacy Preservation in VANETs 16


2.1.1 Non- Cryptographic Approaches 16
2.1.1.1 Random Silent Period Approach 16
2.1.2 Cryptographic Approaches 19
2.1.2.1 Symmetric Key Cryptographic 19
Approach
2.1.2.2 Public Key Infrastructure Approach 20
2.1.2.4 Signature Based Schemes 23
2.2 Authentication in VANETs 26
2.2.1 Pseudonym Based Authentication Scheme 26

3. System Analysis 27

3.1 Data Dictionary 28


3.2 Data Flow Diagram 29

4. Testing and Verification 30

5. Results 47

6. Conclusion and Future Scope 48


7. References 50

8. Appendices- 1, 2, 3 (If any) 55

9. Publication ( If any) 60
CHAPTER 1

INTRODUCTION

When installing sensor networks, the choice of message protocol depends on the setting
in which the network is used. The ZigBee protocol is designed for sensor networks used
to control home lighting, security systems, building automation, etc.In this thesis we will
study the blackhole tolerant protocol for ZigBee based wireless sensor network. In a time
where emphasis in the calculating industry is on computational control, the sensor
networks paradigm takes a different method. Where the personal computer is mostly
about accomplishment certain jobs in a controlled environment, sensor networks are all
about the physical world and the inherent uncertainties that follow. Sensor networks have
already been deployed on wide scale and in a wide range of applications. It has become
clear that the potential impact of sensor networks on our environment and daily lives is
greater than ever, making it one of the utmostencouraging technologies of the era.Where
personal computers are considered as stable, low-cost and computationally they have
several shortcomings that avert them from being organized on a pervasive scale in the
physical world:
Energy: Without a perpetual source of energy, the operating time of personal
computers are measured in hours. This is a problem in sensor networks as a battery
amendment in many cases would be infeasible, due to both locality and dimension of the
network.
Size:Although the size of personal computers have decreased over the years, these
cannot can be placed in a bird's nest, the collar of an animal or on a battleground. Due to
their sheer weight and physical dimensions, the placement would harshlydisturb the
atmosphere in which the computer was placed.
Cost:While the cost of personal computers have decreased rapidly, sensor networks are
targeting an entirely different price range. A cheap PC today cost in the order of a few
hundred dollars while the price of a sensor node is about
APPLICATION LAYER

APPLICATION INTERFACE

NETWORK LAYER

DATA LINK LAYER

MEDIUM ACCESS LAYER

PHY LAYER

SILICON ZIGBEE STACK APPLICATION

Figure 1.1: ISO model shared by customer, ZigBee Stack and IEEE.

You might also like