NS2 Project List
Sl. No. |
NS2 Title |
1 |
Detection of Node-Misbehavior Using Overhearing and Autonomous Agents In Wireless Ad-Hoc Networks |
2 |
A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks |
3 |
Energetic Data Collection Using Multiple Sink Mobility in Wireless Sensor Network |
4 |
Bracer: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance |
5 |
Cost-Aware Secure Routing (Caser) Protocol Design for Wireless Sensor Networks |
6 |
Controlling and Preventing Malicious Nodes Via Bait Detection Scheme |
7 |
Design and Performance Analysis of Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh Networks |
8 |
Detection of Black Hole Attacks in MANETS by Using Principle Of Exclusion And Inclusion. (Neighbor Set Based Method) |
9 |
Efficient and Consistent Path Loss Model for Mobile Network Simulation |
10 |
A Hierarchical Key Management Scheme for Wireless Sensor Networks Based On Identity-Based Encryption |
11 |
Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks |
12 |
Joint Resource Allocation for Throughput Enhancement in Cognitive Radio Femtocell Networks |
13 |
Mobile Sink Based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks |
14 |
Modeling and Analysis of Leap, a Key Management Protocol for Wireless Sensor Networks |
15 |
Advanced Multi-Path Routing Methodology with Energy Efficient MANET Based Traffic Splitting Technique |
16 |
Neighbor Similarity Trust against Sybil Attack in P2p E-Commerce |
17 |
Performance Analysis of AODV and WCETT Routing Protocols In Cognitive Radio Ad-Hoc Network (CRAHN) |
18 |
Range-Free Localization Approach For M2m Communication System Using Mobile Anchor Nodes |
19 |
Secrecy Capacity Optimization Via Cooperative Relaying And Jamming For Wanets |
20 |
Secure Intrusion Detection System for Authentication in Wireless Sensor Networks |
21 |
Software Defined Green Data Center Network with Exclusive Routing |
22 |
Vehicular Ad-Hoc Networks (Vanets) Dynamic Performance Estimation Routing Model For City Scenarios |
23 |
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems |
24 |
Experimental Assessment of ABNO-Driven Multicast Connectivity In Flexgrid Networks |
25 |
Adaptive Efficient Downlink Packet Scheduling Algorithm in LTE-Advanced System |
26 |
Detection of Node-Misbehavior Using Overhearing and Autonomous Agents in Wireless Ad-Hoc Networks |
27 |
Improving the Network Lifetime of MANETS through Cooperative MAC Protocol Design |
28 |
Wireless Communications under Broadband Reactive Jamming Attacks |
29 |
A Distributed Q Learning Spectrum Decision Scheme For Cognitive Radio Sensor Network |
30 |
Adaptive Design Optimization of Wireless Sensor Networks Using Genetic Algorithms |
31 |
A Sensor Anonymity Enhancement Scheme Based On Pseudonym for Clustered Wireless Sensor Network |
32 |
An Energy-Efficient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks |
33 |
Efficient Packet Processing and Optimization Methodologies in Routing Protocols of Green Networking |
34 |
LTE-Advanced Hetnet Investigations under Realistic Conditions |
35 |
On Social Delay-Tolerant Networking: Aggregation, Tie Detection, And Routing |
36 |
Port-Based Traffic Verification as a Paradigm for Anomaly Detection |
37 |
Ns2-Proposed Potential Security Infrastructure in Vanets Using Tamper Registered Hardware |
38 |
Secure Source-Based Loose Synchronization (Sobas) For Wireless Sensor Networks |
39 |
Spectral and Energy Efficiency Analysis for Cognitive Radio Networks |
40 |
Vampire Attacks: Draining Life from Wireless Ad-Hoc Sensor Networks |