Home || About us || Contact us || Sales || Course || Multimedia || Project || Netwoking || Back

 

2015 TO 2008 Project Titles in NS2    

 

S.NO

2015 NS2

DOMAIN

YEAR

1

A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks

MANET

2015

2

CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes

MANET

2015

3

Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc  Networks

MANET

2015

4

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection  Approach

MANET

2015

5

Minimizing Transmission Cost for Third-Party Information Exchange with Network  Coding

MANET

2015

6

Mobile-Projected Trajectory Algorithm with Velocity-Change Detection for Predicting Residual Link Lifetime in  MANET

MANET

2015

7

Optimal Configuration of Network Coding in Ad Hoc   Networks

MANET

2015

8

Packet Delivery Ratio/Cost in MANETs with Erasure Coding and Packet Replication

MANET

2015

9

Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing  Systems

MANET

2015

10

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc  Networks

MANET

2015

11

User Privacy and Data Trustworthiness in Mobile Crowd   Sensing

MANET

2015

12

A Virtual Coordinate-Based Bypassing Void Routing for   WSN

WSN (Routing)

2015

13

Adaptive Routing for Dynamic On-Body  WSN

WSN (Routing)

2015

14

An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile  WSN

WSN (Routing)

2015

15

Cost-Aware SEcure Routing (CASER) Protocol Design for   WSN

WSN (Routing)

2015

16

Efficient Coverage and Connectivity Preservation With Load Balance for WSN

WSN (Routing)

2015

17

Geographic Routing in Clustered WSN Among  Obstacles

WSN (Routing)

2015

18

Impact of Limiting Hop Count on the Lifetime of  WSN

WSN (Routing)

2015

19

Joint Cooperative Routing and Power Allocation for Collision Minimization in WSN With Multiple  Flows

WSN (Routing)

2015

20

Joint Virtual MIMO and Data Gathering for  WSN

WSN (Routing)

2015

21

Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor  Networks

WSN (Routing)

2015

22

Opportunistic Routing Algorithm for Relay Node Selection in WSN

WSN (Routing)

2015

23

PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network

WSN (Routing)

2015

24

Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty- Cycle WSN

WSN (Routing)

2015

25

VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based  WSN

WSN (Routing)

2015

26

A Lightweight Secure Scheme for Detecting Provenance Forgery

and Packet Drop Attacks in Wireless Sensor Networks

WSN (Security)

2015

27

A Secure Scheme Against Power Exhausting Attacks in

Hierarchical Wireless Sensor Networks

WSN (Security)

2015

28

An Efficient Distributed Trust Model for Wireless Sensor Networks

WSN (Security)

2015

29

An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

WSN (Security)

2015

30

Effective Key Management in Dynamic Wireless Sensor Networks

WSN (Security)

2015

31

Secure and Distributed Data Discovery and Dissemination in

Wireless Sensor Networks

WSN (Security)

2015

32

Toward Energy-Efficient Trust System Through Watchdog

Optimization for WSNs

WSN (Security)

2015

33

A Novel PER Degradation Model for VANETs

VANET

2015

34

ACPN: A Novel Authentication Framework with Conditional

Privacy-Preservation and Non-Repudiation for VANETs

VANET

2015

35

BUS-VANET: A BUS Vehicular Network Integrated with Traffic

Infrastructure

VANET

2015

36

Real-Time Path Planning Based on Hybrid-VANET-Enhanced

Transportation System

VANET

2015

37

VANET Modeling and Clustering Design Under Practical Traffic,

Channel and Mobility Conditions

VANET

2015

38

Defeating Jamming With the Power of Silence: A Game-Theoretic

Analysis

WIRELESS

COMMUNICATIONS

2015

39

Passive IP Traceback: Disclosing the Locations of IP Spoofers from

Path Backscatter

INFORMATION

FORENSICS AND

SECURITY

2015

40

Time-Delayed Broadcasting for Defeating Inside Jammers

SECURE COMPUTING

2015

41

Secure Data Aggregation Technique for Wireless Sensor

Networks in the Presence of Collusion Attacks

SECURE COMPUTING

2015