Hi,
Here are some new trending topics for doing projects in NS2.
- Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter - 2015
- A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks - 2015
- Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks - 2015
- Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics - 2015
- Self-Organizing Resource Management Framework in OFDMA Femtocells - 2015
- Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks - 2015
- Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks - 2015
- Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques - 2015
- Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach, IEEE Systems Journal, 2015 [NS2].
- Detection of Malicious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme,International Conference on Advances in Computing, Communication and Control, 2015 [NS2]
- Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc networks, IEEE Transactions on Mobile Computing, 2015 [NS2]
- Wormhole Attack Detection Algorithms in Wireless Network Coding Systems - 2015
- Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm - 2015
- Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks - 2015
- Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing - 2015
- Authenticated Key Exchange Protocols for Parallel Network File Systems - 2015
- Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks - 2015
- Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
- Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
- Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network, International Journal of Computer Applications, June 2015
- Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach, International Journal of Computer Applications, June 2015
- Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks, International Journal of Computer Applications, June 2015
- A Energy Efficient Approach to DSR based Routing Protocol for Ad Hoc Network, International Journal of Computer Applications, May 2015
- Comparison between Minimum Power Consumption and Minimum Battery Cost
- Routing for Energy Management in Wireless Ad Hoc Network, International Journal of Computer Applications, May 2015
- Comparative Analysis of Various Routing Protocol in MANET, International Journal of Computer Applications, May 2015
- Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Network - 2015
- Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs - 2015
- Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks - 2015
- Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design - 2015
- Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks - 2015
- Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs - 2015
- Node Mobility Impact on Zone Routing Protocol, International Journal of Computer Applications, May 2015
- Investigation and Optimization of Hello Message Interval for Scalable Ad-Hoc Network, International Journal of Computer Applications, May 2015
- A Congestion Control Algorithm for Mobility Model in Mobile Ad-hoc Networks, International Journal of Computer Applications, May 2015
- MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense, IEEE Transactions on Mobile Computing, 2015 [NS2]
- CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transaction on Mobile Computing, 2014 [NS2]
- Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, 2012 [NS2]
- A Novel Token based DME Algorithm in MANET, International Journal of Computer Applications, June 2015
- A Reputation-based Incentive Framework for Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
- Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
- Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic, International Journal of Computer Applications, June 2015
- Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET, International Journal of Computer Applications, June 2015
- Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET, International Journal of Computer Applications, May 2015
- Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's, International Journal of Computer Applications, May 2015
- Cluster Head Election Approach based on Weighted Clustering Algorithm for MANET, International Journal of Computer Applications, May 2015
- Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs, International Journal of Computer Applications, May 2015
- Performance Analysis of AODV, CBRP, AOMDV, DSR MANET Routing Protocol using NS2 Simulation, International Journal of Computer Applications, April 2015
- A New Enhanced Energy Efficient Position based Routing Protocol for Mobile Adhoc Network, international Journal of Computer Applications, April 2015
- Clustering in Vehicular Ad Hoc Network for Efficient Communication, International Journal of Computer Applications, April 2015
- Performance Investigation of Signal Strength based Gossip AODV, International Journal of Computer Applications, April 2015
- Highbrow TCP as an Enhanced TCP New Reno for MANETs - A Simulation Approach, International Journal of Computer Applications, April 2015
- Enhance the Efficiency Routing between Mobile Nodes in MANET Networks, International Journal of Computer Applications, March 2015
- Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model, International Journal of Computer Applications, March 2015
- An Approach to Detect Wormhole Attack in AODV based MANET, International Journal of Computer Applications, March 2015
- A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, August 2015 [NS2]
- REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, July- August 2015 [NS2]
- HORA: A Distributed Coverage Hole Repair Algorithm for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July 2015[NS2]
- A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks, IEEE Transactions on Mobile Computing, June 2015 [NS2]
- An Efficient Distributed Trust Model for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, May 2015 [NS2]
- A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, May-June 2015 [NS2]
- Energy-Efficiency based Clustering and Data Aggregation for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
- An Improvement of Network Life Time using DLQAR Protocol in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
- Clustering and General Self-Organized Tree-based Energy-Balance Routing Protocol for Wireless Sensor Network (CGSTEB). International Journal of Computer Applications, May 2015 [NS2]
- Secure based Clustering Algorithm for Wireless Sensor Networks. International Journal of Computer Applications, May 2015 [NS2]
- Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications, May 2015 [NS2]
- Clustering based Data Collection using Data Fusion in Wireless Sensor Networks.International Journal of Computer Applications, April 2015 [NS2]
- An Optimized Cooperative Transmission based on V-BLAST Technique and GA clustering for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
- A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications, April 2015 [NS2]
- Comparative Analysis of Various Energy Efficient Protocols for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
- An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
- An Energy Efficient Critical Event Monitoring Routing Method for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
- Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering. International Journal of Computer Applications, March 2015 [NS2]
- Reliable Adaptive Replication Routing for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
- Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
- Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April 2015 [NS2]
- Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
- Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2]
- Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, January-February 2015 [NS2]
- Energy and Density Aware Clustering (EDAC) to Improve Lifetime and Connectivity in Multi Level Heterogeneous Wireless Sensor Network. International Journal of Computer Applications , June 2015 [NS2]
- Collision Optimized Broadcast Scheduling in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
- Clustering and Energy Efficient Routing Protocol for Wireless Sensor Network using Genetic Algorithm. International Journal of Computer Applications, June 2015 [NS2]
- A Static Code and Dynamic Data Attestation based Intrusion Detection System for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
- Geographic and Opportunistic Routing for Underwater Sensor Networks, IEEE Transaction on Computers, April 2015 [NS2]
- Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network, IEEE Transactions on Emerging Topics in Computing, March 2015 [NS2]
- Distributed Database Management Techniques for Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2/JAVA]
- Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, February 2015 [NS2]
- Effect of using Mobile Sink on Chain-based Routing Protocols in Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
- Improving Energy Estimation based Clustering with Energy Threshold for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
- Batch Mode Job Scheduling Scheme (BJSS) for Clusters in Underwater Wireless Sensor Network (UWSN). International Journal of Computer Applications, June 2015 [NS2]
- Energy Efficient Clustering Routing Protocol based on LEACH for WSN.International Journal of Computer Applications, June 2015 [NS2]
- HEF Clustering for Secure and Efficient Data Transmission in CWSN. International Journal of Computer Applications, April 2015 [NS2]
- Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN. International Journal of Computer Applications, April 2015 [NS2]
- Energy Conservation Protocol using Sleep Scheduling in WSN. International Journal of Computer Applications, March 2015 [NS2]
- Analysis of Random Walk Mobility Models with Location Heterogeneity, IEEE Transaction on Parallel and Distributed System, 2015 [NS2]
- Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, March 2015.
- A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks, Mobile Computing, IEEE Transactions on, February 2015. [NS2]
- A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks, Networking, IEEE/ACM Transaction on, April 2015. [NS2]
- Backoff Design for IEEE 802.11 DCF Networks: Fundamental Trade off and Design Criterion, Networking, IEEE/ACM Transaction on, February 2015. [NS2]
- PDR And HOP Count based Routing for Efficient Energy Usage, International Journal of Computer Applications, June 2015 [NS2]
- Energy-efficient Cluster-based Mechanism for WBAN Communications for Healthcare Applications,International Journal of Computer Applications, June 2015 [NS2]
- Performance Evaluation of DSR and GRP under Black Hole Attack,International Journal of Computer Applications , June 2015 [NS2]
- Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism,International Journal of Computer Applications, June 2015 [NS2]
- Characteristic Analysis of Mobility using Heterogeneous Network,International Journal of Computer Applications, June 2015 [NS2]
- Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement, International Journal of Computer Applications, June 2015 [NS2]
- Hybrid Scheduling for Heterogeneous Asymmetric Mobile Communication,International Journal of Computer Applications, June 2015 [NS2]
- Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks, Networking, IEEE/ACM Transaction on, May 2015. [NS2]
- DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, April 2015 [NS2]
- Distributed Information-Based Cooperative Strategy Adaptation in Opportunistic Mobile Networks, IEEE Transactions on Parallel and Distributed Systems, March 2015. [NS2]
- Real Time Traffic Splitting and Efficient Flooding Mechanism in LSRP,International Journal of Computer Applications, May 2015 [NS2]
- HOP-by-HOP Packet Forwarding Mechanism in Wireless Mesh Network, International Journal of Computer Applications, May 2015 [NS2]
- Performance Comparison of different Congestion Control Protocols in Hybrid Network,International Journal of Computer Applications, May 2015 [NS2]
- Efficient Routing in Zigbee Wireless Network using Shortcut Tree Routing.,International Journal of Computer Applications, May 2015 [NS2]
- Performance Evaluation and Comparison of PDTMRP and MAODV,International Journal of Computer Applications, May 2015 [NS2]
- Impact of Hello Interval on Performance of AODV Protocol,International Journal of Computer Applications, April 2015 [NS2]
- An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters,International Journal of Computer
- Applications, April 2015 [NS2]
- Hybrid Protocol for Handling Security using SBPGP, International Journal of Computer Applications , April 2015 [NS2]
- Efficient Multicast Delivery for Data Redundancy Minimization over Wireless Data Centers, IEEE Transactions on Emerging Topics in Computing, March 2015. [NS2]
- Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks, IEEE/ACM Transactions on Networking, 2015. [NS2]
- Enhancing Availability in Content Delivery Networks for Mobile Platforms, IEEE Transaction on Parallel and Distributed System, Aug. 2015. [NS2]
- High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, April 2015. [NS2]
- Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes, IEEE Transactions on Mobile Computing, 2015 [NS2]
- Neighbor Discovery in Wireless Networks with Multi-packet Reception, IEEE Transaction on Parallel and Distributed Systems, July 2015 [NS2]
- Routing Pressure: A Channel-Related and Traffic-Aware Metric of Routing Algorithm, IEEE Transaction of Parallel and Distributed Systems, March 2015 [NS2]
- The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transaction on Mobile Computing, 2015 [NS2]
- An Efficient Auction-based Mechanism for Mobile Data Offloading, IEEE Transactions on Mobile Computing, August 2015 [NS2]
- Comparative Analysis of E-AOMDV and MC-AOMDV using Multi-criteria Multipath Routing,International Journal of Computer Applications , March 2015 [NS2]
- Message Matching-based Artificial Bee Colony based Behaviour Detection in Delay Tolerant Networks,International Journal of Computer Applications, March 2015 [NS2]
- New Protocol of Aggressive Packet Combining Scheme: An Extension to Throughput Comparison,International Journal of Computer Applications, March 2015 [NS2]
- Performance Comparison of AODV and DSR Routing Protocols using Real Time Test-bed. International Journal of Computer Applications ,February 2015 [NS2]
- Game Theory based Incentive Mechanisms in Delay Tolerant Network,International Journal of Computer Applications, April 2015 [NS2]
- Concurrent Bandwidth Reservation Strategies for Big Data Transfers in HighPerformance Networks, IEEE Transactions on Network and Service Management, June 2015.
- Incentive Based Data Sharing in Delay Tolerant Mobile Networks, IEEE Transactions on Wireless Communications, January 2014 [NS2].
- Technique to Improve the File Transfer Outcomes Between Road Side Unit and Vehicles in Vehicular Ad-Hoc Networks, International Conference on Computing, Communication and Automation, May 2015 [NS2].
- A Reactive and Scalable Unicast Solution for Video Streaming over VANETs, IEEE Transaction on Computers, 2015 [NS2]
- Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs , IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]
- Isolating Packet Dropping Misbehavior in VANET Using Ant Colony Optimization, International Journal of Computer Applications, June 2015.
- An Intersection based Traffic Monitoring using VANET, International Journal of Computer Applications, May 2015.
- PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications,IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]