Hi All, Our website moved to a new URL. Please bookmark the new link: https://ns2bloggers.blogspot.com/

Wednesday 21 December 2016

SOFTWARE DEFINED NETWORKS (SDN) SIMULATION IN NS2

Hi,
  Today we are going to have a look on software defined network simulation. Before that I will explain what a software defined network means?

Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of lower-level functionality. SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers. This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
SDN was commonly associated with the OpenFlow protocol (for remote communication with network plane elements for the purpose of determining the path of network packets across network switches) since the latter's emergence in 2011. Since 2012, however, many companies have moved away from OpenFlow, and have embraced different techniques. These include Cisco Systems' Open Network Environment and Nicira's network virtualization platform.
SD-WAN applies similar technology to a wide area network (WAN).


Features of SDN:
  • It’s an open standards-based.
  • Pro-grammatically configured.
  • Directly programmable.
  • Centrally managed .
  • Agile.
Types of tiers in SDN architecture:
  • Application tier.
  • Control plane tier.
  • Infrastructure or Data-plane tier.
Benefits of SDN:
  • Deliver agility and flexibility.
  • Reduce capEx.
  • Enable innovation.
  • Reduce OpEx.
Sample Codes:


SDN::SDN(nsaddr_t id) : Agent(PT_SDN),btimer(this), htimer(this), ntimer(this),   rtimer(this), lrtimer(this), rqueue() {
                   
  index = id;
  seqno = 2;
  bid = 1;
   LIST_INIT(&nbhead);
  LIST_INIT(&bihead);
   logtarget = 0;
  ifqueue = 0;
  xpos=0.0;
  ypos=0.0;
  zpos=0.0;
  MobileNode *iNode;
 }
  
void
BroadcastTimer::handle(Event*) {
   agent->id_purge();
  Scheduler::instance().schedule(this, &intr, BCAST_ID_SAVE);
 }

void
HelloTimer::handle(Event*) {
    agent->sendHello();
   double interval = MinHelloInterval + 
                 ((MaxHelloInterval - MinHelloInterval) * Random::uniform());
   assert(interval >= 0);
   Scheduler::instance().schedule(this, &intr, interval);
}
  
void
NeighborTimer::handle(Event*) {
  agent->nb_purge();
  Scheduler::instance().schedule(this, &intr, HELLO_INTERVAL);
}
  
void
RouteCacheTimer::handle(Event*) {
  agent->rt_purge();
  Scheduler::instance().schedule(this, &intr, FREQUENCY);
 }

For sample video, Click here

Sunday 17 July 2016

SETTING A NODE TO SLEEP IN NS2

Hi,
I just saw a lot of mails asking about "how to set a node as sleeping in ns2?" Now I am going to explain more about this in this post. Normally when using certain functions like Sleep"() Function from SMAC,we get the Segmentation fault or Floating point as result and it was hard to solve that. Normally, a node has four state: on,off,idle and sleep. We can consider sleep and idle as same state. In off condition, node becomes off but it still broadcasts based on protocol used. As from the tcl script we can simply on/off the nodes. But to make a node sleep/idle, we have to make changes in its back end files(.cc files). Also we can do the same by using the command "set idle_time_".

For Idle Condition

$ cd ns-2.3x/tcl/ex/
$ grep -Rin idle_time *
The simulation examples are ( grep will also list a lot of config files.tcl ) :
realaudio/ramodel.tcl
sat-aloha.tcl
srm.tcl
srm-session.tcl
test-rcvr.tcl
( Copy namfilter.tcl to ex/ from nam-1.1x/bin/.)
tcpsrm.tcl ( Edit line 130 to e.g.: exec tclsh8.6 ./namfilter.tcl out.nam )
test-tbf.tcl
tg.tcl
xcp/2statemarkovB.tcl 
(xcp-tcp.tcl must be run beforehand to create the required xcp0.tr) 
wpan/{ wpan_demo1.tcl, wpan_demo2.tcl ....... wpan_demo5.tcl }

By running this files, we can see the visualization.

For Sleep Condition

Sleep Condition in Energy Models
To achieve sleep condition in energy models: energymodel.cc, modify mac-802_11.cc in ns-2.35/mac/
Please use the code void Mac802_11::recv function 

if(index_ == nodeno){
EnergyModel *em = netif_->node()->energy_model();
if (em && em->sleep()) {
//em->set_node_state(EnergyModel::INROUTE);
em->set_node_sleep(1);
}
}

Replace "nodeno" with the number of the nodes you want to set to sleep.

Perform the following commands in order.
./configure
make clean
make depend // Optional
make
sudo make install
U shall get no errors. If you are getting any errors ask in the comments section.
After that run the tcl file to test.

Result: When the nodes get the first packet, the shape of them must change from black circle to black circle blue hexagon.From then on the nodes must not send or receive any data packet.

Sleep Condition in Wireless Models
To achieve sleep condition in energy models: select wireless-phy.cc in ns-2.35/mac/
We can simply use function at the end of file on the wireless-phy.cc to set a node to sleep or off by just calling functions.But we may need to use them in another layer like in mac.To use those functions in mac-802_11.cc simply use the below code anywhere you want in mac-802_11.cc and add wireless-phy.cc to your mac headers:

#include "wireless-phy.h" // at the header of mac-802_11.cc
/*
* Use the below code in any function you want in mac
*/
Phy *p;
p=netif_;
(
(WirelessPhy *)p)->node_sleep();
.

And to use another one of those 4 function just change the function's name like ->node_sleep(); to ->node_wakeup();.

Automated Validation of Internet Security Protocols and Applications[AVISPA]

The AVISPA Tool provides a suite of applications for building and analyzing formal models of security protocols. Protocol models are written in the High Level Protocol Specification Language, or HLPSL. It aims at developing a push-button, industrial-strength technology for the analysis of large-scale Internet security-sensitive protocols and applications. Also provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. Experimental results, carried out on a large library of Internet security protocols, indicate that the AVISPA tool is the state of the art for automatic security protocols. No other tool combines the same scope and robustness with such performance and scalability.
With the spread of the Internet and network-based services and the development of new technological possibilities, the number and scale of new security protocols under development is outpacing the human ability to rigorously analyse and validate them. This is an increasingly serious problem for standardization organizations like the Internet Engineering Task Force (IETF), the International Telecommunication Union (ITU) and the World Wide Web Consortium (W3C). It also affects companies whose products and services depend on the rapid standardization and correct functioning of these protocols, and users whose rights and freedoms (eg the right to privacy of personal data) depend on a secure infrastructure.
Designing secure protocols is a hard problem. In open networks such as the Internet, protocols should work even under worst-case assumptions, eg that messages may be seen or tampered with by an intruder (also called the attacker or spy). Severe attacks can be conducted without breaking cryptography, by exploiting weaknesses in the protocols themselves. Examples of this are 'masquerading attacks', in which an attacker impersonates an honest agent, or 'replay attacks', in which messages from one protocol session (ie execution of the protocol) are used in another session. The possibility of these attacks sometimes stems from subtle mistakes in protocol design. Typically these attacks go unnoticed, as it is difficult for humans, despite careful protocol inspection, to determine all the complex ways in which protocol sessions can be interleaved, with the possible interference of a malicious intruder.
Tools that support a rigorous analysis of security protocols are thus of great importance in accelerating and improving the development of the next generation of security protocols. Ideally, these tools should be completely automated, robust, expressive and easily usable, so that they can be integrated into protocol development and standardization processes.
Although in the last decade many new techniques that can automatically analyse small and medium-scale protocols have been developed, moving up to large-scale Internet security protocols remains a challenge. The AVISPA tool is a push-button tool for the Automated Validation of Internet Security-sensitive Protocols and Applications, which rises to this challenge in a systematic way. First, it provides a modular and expressive formal language for specifying security protocols and properties. Second, it integrates different back-ends that implement a variety of automatic analysis techniques ranging from protocol falsification (by finding an attack on the input protocol) to abstraction-based verification methods for both finite and infinite numbers of sessions. To the best of our knowledge, no other tool exhibits the same scope and robustness while enjoying the same performance and scalability.
AVISPA Web-based graphical user interface.

As shown in the figure, AVISPA is equipped with a Web-based graphical user interface that supports the editing of protocol specifications and allows the user to select and configure the back-ends integrated into the tool. If an attack on a protocol is found, the tool displays it as a message-sequence chart. The interface features specialized menus for both novice and expert users. A protocol designer interacts with the tool by specifying a security problem (ie a protocol paired with a security property that the protocol is expected to achieve) in the High-Level Protocol Specification Language (HLPSL). The HLPSL is an expressive, modular, role-based, formal language that is used to specify control-flow patterns, data-structures, alternative intruder models and complex security properties, as well as different cryptographic primitives and their algebraic properties. These features make HLPSL well suited for specifying modern, industrial-scale protocols.
In order to demonstrate the effectiveness of AVISPA, we selected a substantial set of security problems associated with protocols that have recently been, or are currently being standardized by organizations like the Internet Engineering Task Force IETF. We then formalized a large subset of these protocols in HLPSL. The result of this specification effort is the AVISPA Library (publicly available on the AVISPA Web site), which at present comprises 215 security problems derived from 48 protocols. Most of the problems in the library can be solved by the AVISPA tool in a few seconds. Moreover, AVISPA detected a number of previously unknown attacks on some of the protocols analysed, eg on some protocols of the ISO-PK family, on the IKEv2-DS protocol, and on the H.530 protocol.
The AVISPA tool can be freely accessed either through its Web-based interface or by downloading and installing the software distribution. For more details, please refer to the AVISPA Web site.
AVISPA has been developed in the context of the FET Open Project IST-2001-39252 'AVISPA: Automated Validation of Internet Security Protocols and Applications', in collaboration with the University of Genova, INRIA Lorraine, ETH Zurich and Siemens Munich.

For More, Click Here

For Tutorial, Click Here



Monday 20 June 2016

Animator Tools for NS3

Animators are the most important tool in network simulation. It gave us a visual treat about A network and its performance over a certain period under certain circumstances/conditions. Network Simulator 2 version has many animator tools as default NAM. But in the case of ns3, it doesn't have a default animator tool. So, we have to use certain methods to animate a network. And for that, we a currently using two methods and are;
1. PyViz Method
2. NetAnim Method

PyViz Method
    As like NAM, It is not a animator which generates trace files. It is a live visualizer and which doesn't creates trace files. So, it is very use full for debugging purposes. Debugging purposes means to find out what you expect and where to packets been dropped out in a mobility model. 
Pyviz-flowmon.png
PyViz Interface
Most importantly, it works on Interactive python console and written in python and can use in c++ simulations also.
For More, Click here

NetAnim Method
    It is a stand-alone program which uses the custom trace files generated by the animation interface to graphically display the simulation. NetAnim is based on the multi-platform Qt4 GUI toolkit. 
_images/animation-dumbbell1.png
NetAnim GUI with dumbbell animation.


It provides play, pause, and record buttons. Play and pause start and stop the simulation. The record button starts a series of screenshots of the animator, which are written to the directory in which the trace file was run. Two slider bars also exist. The top slider provides a “seek” functionality, which allows a user to skip to any moment in the simulation. The bottom slider changes the granularity of the time step for the animation. Finally, there is a quit button to stop the simulation and quit the animator.
For More, Click here

Friday 6 May 2016

NS2 versus NS3


Network simulation is undoubtedly one of the most prevalent evaluation methodologies in the area of computer networks. While simulation is not the only tool used for data networking research, it is extremely useful because it often allows research questions and prototypes to be explored at relatively lesser cost and time than that required to experiment with real implementations and networks. The network simulators allow one to model an arbitrary computer network by specifying both the behavior of the network nodes and the communication channels. It provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios. The newly proposed network simulator NS-3 supports coupling, interoperability, good memory management, debugging of split language objects, coding in C++ and object oriented concepts, as well as supports models supported by NS-2 and most suitable for wireless networks. The primary purpose of this post is to review this new simulator, as well as find its advantages in the field of research and how it is different from others mainly Ns2.

Click here

Tuesday 19 April 2016

Low-rate Distributed Denial Of Service[LDDos] Attack Simulation in NS2

In network attacks, the attacker injects a large amount of spam packets into the network which leads to the crashing of network utilities and causes congestion in network. 

For codes, Click here



Saturday 9 April 2016

Satellite Network Simulation In NS

Hi,
 This post is to show how we can simulate a satellite network in Network Simulator. Some extensions can enable ns to model;

  1. Traditional geostationary ``bent-pipe'' satellites with multiple users per uplink/downlink and asymmetric links.
  2. Geostationary satellites with processing payloads (either regenerative payloads or full packet switching).
  3. Polar orbiting LEO constellations such as Iridium and Teledesic. 

These satellite models are principally aimed at using ns to study networking aspects of satellite systems; in particular, MAC, link layer, routing, and transport protocols.

For more, Click Here



Wednesday 30 March 2016

NEW NS2 PROJECT TOPICS

Hi, 
 Here are some new trending topics for doing projects in NS2.
  • Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter - 2015 
  • A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks - 2015 
  • Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks - 2015 
  • Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics - 2015 
  • Self-Organizing Resource Management Framework in OFDMA Femtocells - 2015 
  • Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks - 2015 
  • Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks - 2015 
  • Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques - 2015 
  • Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection  Approach, IEEE Systems Journal, 2015 [NS2].
  • Detection of Malicious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme,International Conference on Advances in Computing, Communication and Control, 2015 [NS2]
  • Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc networks, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems - 2015 
  • Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm - 2015 
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks - 2015 
  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing - 2015 
  • Authenticated Key Exchange Protocols for Parallel Network File Systems - 2015 
  • Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks - 2015 
  • Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless  Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network, International Journal of Computer Applications, June 2015
  • Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach, International Journal of Computer Applications, June 2015
  • Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks, International Journal of Computer Applications, June 2015
  • A Energy Efficient Approach to DSR based Routing Protocol for Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparison between Minimum Power Consumption and Minimum Battery Cost
  • Routing for Energy Management in Wireless Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparative Analysis of Various Routing Protocol in MANET, International Journal of Computer Applications, May 2015
  • Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Network - 2015 
  • Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs - 2015 
  • Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks - 2015 
  • Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design - 2015 
  • Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks - 2015 
  • Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs - 2015 
  • Node Mobility Impact on Zone Routing Protocol, International Journal of Computer Applications, May 2015
  • Investigation and Optimization of Hello Message Interval for Scalable Ad-Hoc Network, International Journal of Computer Applications, May 2015
  • A Congestion Control Algorithm for Mobility Model in Mobile Ad-hoc Networks, International Journal of Computer Applications, May 2015
  • MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense, IEEE Transactions on Mobile Computing, 2015 [NS2]
  •  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transaction on Mobile Computing, 2014 [NS2]
  • Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, 2012 [NS2]
  • A Novel Token based DME Algorithm in MANET, International Journal of Computer Applications, June 2015
  • A Reputation-based Incentive Framework for Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic, International Journal of Computer Applications, June 2015
  • Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET, International Journal of Computer Applications, June 2015
  • Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET, International Journal of Computer Applications, May 2015
  • Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's, International Journal of Computer Applications, May 2015
  • Cluster Head Election Approach based on Weighted Clustering Algorithm for MANET, International Journal of Computer Applications, May 2015
  • Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs, International Journal of Computer Applications, May 2015
  • Performance Analysis of AODV, CBRP, AOMDV, DSR MANET Routing Protocol using NS2 Simulation, International Journal of Computer Applications, April 2015
  • A New Enhanced Energy Efficient Position based Routing Protocol for Mobile Adhoc Network, international Journal of Computer Applications, April 2015
  • Clustering in Vehicular Ad Hoc Network for Efficient Communication, International Journal of Computer Applications, April 2015
  • Performance Investigation of Signal Strength based Gossip AODV, International Journal of Computer Applications, April 2015
  • Highbrow TCP as an Enhanced TCP New Reno for MANETs - A Simulation Approach, International Journal of Computer Applications, April 2015
  • Enhance the Efficiency Routing between Mobile Nodes in MANET Networks, International Journal of Computer Applications, March 2015
  • Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model, International Journal of Computer Applications, March 2015
  • An Approach to Detect Wormhole Attack in AODV based MANET, International Journal of Computer Applications, March 2015
  • A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, August 2015 [NS2]
  • REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, July- August 2015 [NS2]
  • HORA: A Distributed Coverage Hole Repair Algorithm for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July 2015[NS2]
  • A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks, IEEE Transactions on Mobile Computing, June 2015 [NS2]
  • An Efficient Distributed Trust Model for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, May 2015 [NS2]
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, May-June 2015 [NS2]
  • Energy-Efficiency based Clustering and Data Aggregation for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • An Improvement of Network Life Time using DLQAR Protocol in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and General Self-Organized Tree-based Energy-Balance Routing Protocol for Wireless Sensor Network (CGSTEB). International Journal of Computer Applications, May 2015 [NS2]
  • Secure based Clustering Algorithm for Wireless Sensor Networks. International Journal of Computer Applications, May 2015 [NS2]
  • Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications, May 2015 [NS2]
  • Clustering based Data Collection using Data Fusion in Wireless Sensor Networks.International Journal of Computer Applications, April 2015 [NS2]
  • An Optimized Cooperative Transmission based on V-BLAST Technique and GA clustering for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications, April 2015 [NS2]
  • Comparative Analysis of Various Energy Efficient Protocols for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Efficient Critical Event Monitoring Routing Method for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering. International Journal of Computer Applications, March 2015 [NS2]
  • Reliable Adaptive Replication Routing for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April 2015 [NS2]
  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2]
  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, January-February 2015 [NS2]
  • Energy and Density Aware Clustering (EDAC) to Improve Lifetime and Connectivity in Multi Level Heterogeneous Wireless Sensor Network. International Journal of Computer Applications , June 2015 [NS2]
  • Collision Optimized Broadcast Scheduling in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and Energy Efficient Routing Protocol for Wireless Sensor Network using Genetic Algorithm. International Journal of Computer Applications, June 2015 [NS2]
  • A Static Code and Dynamic Data Attestation based Intrusion Detection System for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • Geographic and Opportunistic Routing for Underwater Sensor Networks, IEEE Transaction on Computers, April 2015 [NS2]
  • Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network, IEEE Transactions on Emerging Topics in Computing, March 2015 [NS2]
  • Distributed Database Management Techniques for Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2/JAVA]
  • Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, February 2015 [NS2]
  • Effect of using Mobile Sink on Chain-based Routing Protocols in Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving Energy Estimation based Clustering with Energy Threshold for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Batch Mode Job Scheduling Scheme (BJSS) for Clusters in Underwater Wireless Sensor Network (UWSN). International Journal of Computer Applications, June 2015 [NS2]
  • Energy Efficient Clustering Routing Protocol based on LEACH for WSN.International Journal of Computer Applications, June 2015 [NS2]
  • HEF Clustering for Secure and Efficient Data Transmission in CWSN. International Journal of Computer Applications, April 2015 [NS2]
  • Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN. International Journal of Computer Applications, April 2015 [NS2]
  • Energy Conservation Protocol using Sleep Scheduling in WSN. International Journal of Computer Applications, March 2015 [NS2]
  • Analysis of Random Walk Mobility Models with Location Heterogeneity, IEEE Transaction on Parallel and Distributed System, 2015 [NS2]
  • Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, March 2015.
  • A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks, Mobile Computing, IEEE Transactions on, February 2015. [NS2]
  • A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks, Networking, IEEE/ACM Transaction on, April 2015. [NS2]
  • Backoff Design for IEEE 802.11 DCF Networks: Fundamental Trade off and Design Criterion, Networking, IEEE/ACM Transaction on, February 2015. [NS2]
  • PDR And HOP Count based Routing for Efficient Energy Usage, International Journal of Computer Applications, June 2015 [NS2]
  • Energy-efficient Cluster-based Mechanism for WBAN Communications for Healthcare Applications,International Journal of Computer Applications, June 2015 [NS2]
  • Performance Evaluation of DSR and GRP under Black Hole Attack,International Journal of Computer Applications , June 2015 [NS2]
  • Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism,International Journal of Computer Applications, June 2015 [NS2]
  • Characteristic Analysis of Mobility using Heterogeneous Network,International Journal of Computer Applications, June 2015 [NS2]
  • Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement, International Journal of Computer Applications, June 2015 [NS2]
  • Hybrid Scheduling for Heterogeneous Asymmetric Mobile Communication,International Journal of Computer Applications, June 2015 [NS2]
  • Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks, Networking, IEEE/ACM Transaction on, May 2015. [NS2]
  • DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, April 2015 [NS2]
  • Distributed Information-Based Cooperative Strategy Adaptation in Opportunistic Mobile Networks, IEEE Transactions on Parallel and Distributed Systems, March 2015. [NS2]
  • Real Time Traffic Splitting and Efficient Flooding Mechanism in LSRP,International Journal of Computer Applications, May 2015 [NS2]
  • HOP-by-HOP Packet Forwarding Mechanism in Wireless Mesh Network, International Journal of Computer Applications, May 2015 [NS2]
  • Performance Comparison of different Congestion Control Protocols in Hybrid Network,International Journal of Computer Applications, May 2015 [NS2]
  • Efficient Routing in Zigbee Wireless Network using Shortcut Tree Routing.,International Journal of Computer Applications, May 2015 [NS2]
  • Performance Evaluation and Comparison of PDTMRP and MAODV,International Journal of Computer Applications, May 2015 [NS2]
  • Impact of Hello Interval on Performance of AODV Protocol,International Journal of Computer Applications, April 2015 [NS2]
  • An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters,International Journal of Computer
  • Applications, April 2015 [NS2]
  • Hybrid Protocol for Handling Security using SBPGP, International Journal of Computer Applications , April 2015 [NS2]
  • Efficient Multicast Delivery for Data Redundancy Minimization over Wireless Data Centers, IEEE Transactions on Emerging Topics in Computing, March 2015. [NS2]
  • Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks, IEEE/ACM Transactions on Networking, 2015. [NS2]
  • Enhancing Availability in Content Delivery Networks for Mobile Platforms, IEEE Transaction on Parallel and Distributed System, Aug. 2015. [NS2]
  • High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, April 2015. [NS2]
  • Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Neighbor Discovery in Wireless Networks with Multi-packet Reception, IEEE Transaction on Parallel and Distributed Systems, July 2015 [NS2]
  • Routing Pressure: A Channel-Related and Traffic-Aware Metric of Routing Algorithm, IEEE Transaction of Parallel and Distributed Systems, March 2015 [NS2]
  • The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • An Efficient Auction-based Mechanism for Mobile Data Offloading, IEEE Transactions on Mobile Computing, August 2015 [NS2]
  • Comparative Analysis of E-AOMDV and MC-AOMDV using Multi-criteria Multipath Routing,International Journal of Computer Applications , March 2015 [NS2]
  • Message Matching-based Artificial Bee Colony based Behaviour Detection in Delay Tolerant Networks,International Journal of Computer Applications, March 2015 [NS2]
  • New Protocol of Aggressive Packet Combining Scheme: An Extension to Throughput Comparison,International Journal of Computer Applications, March 2015 [NS2]
  • Performance Comparison of AODV and DSR Routing Protocols using Real Time Test-bed. International Journal of Computer Applications ,February 2015 [NS2]
  • Game Theory based Incentive Mechanisms in Delay Tolerant Network,International Journal of Computer Applications, April 2015 [NS2]
  • Concurrent Bandwidth Reservation Strategies for Big Data Transfers in HighPerformance Networks, IEEE Transactions on Network and Service Management, June 2015.
  •  Incentive Based Data Sharing in Delay Tolerant Mobile Networks, IEEE Transactions on Wireless Communications, January 2014 [NS2].
  • Technique to Improve the File Transfer Outcomes Between Road Side Unit and Vehicles in Vehicular Ad-Hoc Networks, International Conference on Computing, Communication and Automation, May 2015 [NS2].
  • A Reactive and Scalable Unicast Solution for Video Streaming over VANETs, IEEE Transaction on Computers, 2015 [NS2]
  • Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs , IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]
  • Isolating Packet Dropping Misbehavior in VANET Using Ant Colony Optimization, International Journal of Computer Applications, June 2015.
  • An Intersection based Traffic Monitoring using VANET, International Journal of Computer Applications, May 2015.
  • PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications,IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]