Home || About us || Contact us || Sales || Course || Multimedia || Project || Netwoking || Back
2015 TO 2008 Project Titles in NS2
S.NO |
2015 NS2 |
DOMAIN |
YEAR |
|
1 |
A Historical-Beacon-Aided Localization Algorithm for |
MANET |
2015 |
|
2 |
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes |
MANET |
2015 |
|
3 |
Cooperative Load Balancing and Dynamic Channel
Allocation for Cluster-Based |
MANET |
2015 |
|
4 |
Defending Against Collaborative Attacks
by Malicious Nodes
in MANETs: A Cooperative
Bait Detection Approach |
MANET |
2015 |
|
5 |
Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding |
MANET |
2015 |
|
6 |
Mobile-Projected Trajectory Algorithm
with Velocity-Change Detection for
Predicting Residual Link Lifetime in MANET |
MANET |
2015 |
|
7 |
Optimal Configuration of Network Coding
in Ad Hoc Networks |
MANET |
2015 |
|
8 |
Packet
Delivery Ratio/Cost in MANETs with Erasure Coding
and Packet Replication |
MANET |
2015 |
|
9 |
Privacy and Quality Preserving Multimedia Data Aggregation for Participatory
Sensing Systems |
MANET |
2015 |
|
10 |
Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks |
MANET |
2015 |
|
11 |
User Privacy and Data Trustworthiness
in |
MANET |
2015 |
|
12 |
A
Virtual Coordinate-Based Bypassing Void Routing for WSN |
WSN (Routing) |
2015 |
|
13 |
Adaptive
Routing for Dynamic On-Body WSN |
WSN (Routing) |
2015 |
|
14 |
An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based |
WSN (Routing) |
2015 |
|
15 |
Cost-Aware SEcure Routing (CASER)
Protocol Design for WSN |
WSN (Routing) |
2015 |
|
16 |
Efficient Coverage and Connectivity Preservation With Load
Balance for WSN |
WSN (Routing) |
2015 |
|
17 |
Geographic Routing in Clustered WSN
Among Obstacles |
WSN (Routing) |
2015 |
|
18 |
Impact
of Limiting Hop Count on the Lifetime of WSN |
WSN (Routing) |
2015 |
|
19 |
Joint
Cooperative Routing and Power Allocation for Collision Minimization in WSN With Multiple Flows |
WSN (Routing) |
2015 |
|
20 |
Joint
Virtual MIMO and Data Gathering for WSN |
WSN (Routing) |
2015 |
|
21 |
Mobile
Data Gathering with Load Balanced
Clustering and Dual Data
Uploading in Wireless Sensor Networks |
WSN (Routing) |
2015 |
|
22 |
Opportunistic Routing Algorithm for Relay Node Selection in WSN |
WSN (Routing) |
2015 |
|
23 |
PWDGR: Pair-Wise Directional Geographical Routing
Based on Wireless Sensor Network |
WSN (Routing) |
2015 |
|
24 |
Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty- Cycle
WSN |
WSN (Routing) |
2015 |
|
25 |
VGDRA:
A Virtual Grid-Based Dynamic Routes Adjustment Scheme for |
WSN (Routing) |
2015 |
|
26 |
A
Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
WSN
(Security) |
2015 |
|
27 |
A Secure Scheme Against
Power Exhausting Attacks in Hierarchical Wireless
Sensor Networks |
WSN
(Security) |
2015 |
|
28 |
An Efficient Distributed
Trust Model for Wireless Sensor Networks |
WSN
(Security) |
2015 |
|
29 |
An Encryption Scheme Using
Chaotic Map and Genetic Operations for Wireless Sensor Networks |
WSN
(Security) |
2015 |
|
30 |
Effective Key
Management in Dynamic Wireless Sensor Networks |
WSN
(Security) |
2015 |
|
31 |
Secure and Distributed
Data Discovery and Dissemination in Wireless
Sensor Networks |
WSN
(Security) |
2015 |
|
32 |
Toward Energy-Efficient
Trust System Through Watchdog Optimization
for WSNs |
WSN
(Security) |
2015 |
|
33 |
A Novel PER
Degradation Model for VANETs |
VANET |
2015 |
|
34 |
ACPN: A Novel
Authentication Framework with Conditional Privacy-Preservation
and Non-Repudiation for VANETs |
VANET |
2015 |
|
35 |
BUS-VANET: A BUS Vehicular
Network Integrated with Traffic Infrastructure |
VANET |
2015 |
|
36 |
Real-Time Path Planning
Based on Hybrid-VANET-Enhanced Transportation System |
VANET |
2015 |
|
37 |
VANET Modeling and
Clustering Design Under Practical Traffic, Channel and Mobility
Conditions |
VANET |
2015 |
|
38 |
Defeating Jamming With the
Power of Silence: A Game-Theoretic Analysis |
WIRELESS COMMUNICATIONS |
2015 |
|
39 |
Passive
IP Traceback: Disclosing the Locations of IP Spoofers from Path
Backscatter |
INFORMATION FORENSICS AND SECURITY |
2015 |
|
40 |
Time-Delayed Broadcasting for Defeating Inside Jammers |
SECURE
COMPUTING |
2015 |
|
41 |
Secure Data Aggregation
Technique for Wireless Sensor Networks in the Presence
of Collusion Attacks |
SECURE
COMPUTING |
2015 |
|