Hi All, Our website moved to a new URL. Please bookmark the new link: https://ns2bloggers.blogspot.com/

Wednesday 30 March 2016

NEW NS2 PROJECT TOPICS

Hi, 
 Here are some new trending topics for doing projects in NS2.
  • Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter - 2015 
  • A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks - 2015 
  • Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks - 2015 
  • Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics - 2015 
  • Self-Organizing Resource Management Framework in OFDMA Femtocells - 2015 
  • Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks - 2015 
  • Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks - 2015 
  • Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques - 2015 
  • Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection  Approach, IEEE Systems Journal, 2015 [NS2].
  • Detection of Malicious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme,International Conference on Advances in Computing, Communication and Control, 2015 [NS2]
  • Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc networks, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems - 2015 
  • Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm - 2015 
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks - 2015 
  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing - 2015 
  • Authenticated Key Exchange Protocols for Parallel Network File Systems - 2015 
  • Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks - 2015 
  • Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless  Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network, International Journal of Computer Applications, June 2015
  • Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach, International Journal of Computer Applications, June 2015
  • Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks, International Journal of Computer Applications, June 2015
  • A Energy Efficient Approach to DSR based Routing Protocol for Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparison between Minimum Power Consumption and Minimum Battery Cost
  • Routing for Energy Management in Wireless Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparative Analysis of Various Routing Protocol in MANET, International Journal of Computer Applications, May 2015
  • Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Network - 2015 
  • Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs - 2015 
  • Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks - 2015 
  • Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design - 2015 
  • Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks - 2015 
  • Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs - 2015 
  • Node Mobility Impact on Zone Routing Protocol, International Journal of Computer Applications, May 2015
  • Investigation and Optimization of Hello Message Interval for Scalable Ad-Hoc Network, International Journal of Computer Applications, May 2015
  • A Congestion Control Algorithm for Mobility Model in Mobile Ad-hoc Networks, International Journal of Computer Applications, May 2015
  • MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense, IEEE Transactions on Mobile Computing, 2015 [NS2]
  •  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transaction on Mobile Computing, 2014 [NS2]
  • Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, 2012 [NS2]
  • A Novel Token based DME Algorithm in MANET, International Journal of Computer Applications, June 2015
  • A Reputation-based Incentive Framework for Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic, International Journal of Computer Applications, June 2015
  • Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET, International Journal of Computer Applications, June 2015
  • Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET, International Journal of Computer Applications, May 2015
  • Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's, International Journal of Computer Applications, May 2015
  • Cluster Head Election Approach based on Weighted Clustering Algorithm for MANET, International Journal of Computer Applications, May 2015
  • Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs, International Journal of Computer Applications, May 2015
  • Performance Analysis of AODV, CBRP, AOMDV, DSR MANET Routing Protocol using NS2 Simulation, International Journal of Computer Applications, April 2015
  • A New Enhanced Energy Efficient Position based Routing Protocol for Mobile Adhoc Network, international Journal of Computer Applications, April 2015
  • Clustering in Vehicular Ad Hoc Network for Efficient Communication, International Journal of Computer Applications, April 2015
  • Performance Investigation of Signal Strength based Gossip AODV, International Journal of Computer Applications, April 2015
  • Highbrow TCP as an Enhanced TCP New Reno for MANETs - A Simulation Approach, International Journal of Computer Applications, April 2015
  • Enhance the Efficiency Routing between Mobile Nodes in MANET Networks, International Journal of Computer Applications, March 2015
  • Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model, International Journal of Computer Applications, March 2015
  • An Approach to Detect Wormhole Attack in AODV based MANET, International Journal of Computer Applications, March 2015
  • A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, August 2015 [NS2]
  • REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, July- August 2015 [NS2]
  • HORA: A Distributed Coverage Hole Repair Algorithm for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July 2015[NS2]
  • A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks, IEEE Transactions on Mobile Computing, June 2015 [NS2]
  • An Efficient Distributed Trust Model for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, May 2015 [NS2]
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, May-June 2015 [NS2]
  • Energy-Efficiency based Clustering and Data Aggregation for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • An Improvement of Network Life Time using DLQAR Protocol in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and General Self-Organized Tree-based Energy-Balance Routing Protocol for Wireless Sensor Network (CGSTEB). International Journal of Computer Applications, May 2015 [NS2]
  • Secure based Clustering Algorithm for Wireless Sensor Networks. International Journal of Computer Applications, May 2015 [NS2]
  • Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications, May 2015 [NS2]
  • Clustering based Data Collection using Data Fusion in Wireless Sensor Networks.International Journal of Computer Applications, April 2015 [NS2]
  • An Optimized Cooperative Transmission based on V-BLAST Technique and GA clustering for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications, April 2015 [NS2]
  • Comparative Analysis of Various Energy Efficient Protocols for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Efficient Critical Event Monitoring Routing Method for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering. International Journal of Computer Applications, March 2015 [NS2]
  • Reliable Adaptive Replication Routing for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April 2015 [NS2]
  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2]
  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, January-February 2015 [NS2]
  • Energy and Density Aware Clustering (EDAC) to Improve Lifetime and Connectivity in Multi Level Heterogeneous Wireless Sensor Network. International Journal of Computer Applications , June 2015 [NS2]
  • Collision Optimized Broadcast Scheduling in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and Energy Efficient Routing Protocol for Wireless Sensor Network using Genetic Algorithm. International Journal of Computer Applications, June 2015 [NS2]
  • A Static Code and Dynamic Data Attestation based Intrusion Detection System for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • Geographic and Opportunistic Routing for Underwater Sensor Networks, IEEE Transaction on Computers, April 2015 [NS2]
  • Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network, IEEE Transactions on Emerging Topics in Computing, March 2015 [NS2]
  • Distributed Database Management Techniques for Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2/JAVA]
  • Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, February 2015 [NS2]
  • Effect of using Mobile Sink on Chain-based Routing Protocols in Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving Energy Estimation based Clustering with Energy Threshold for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Batch Mode Job Scheduling Scheme (BJSS) for Clusters in Underwater Wireless Sensor Network (UWSN). International Journal of Computer Applications, June 2015 [NS2]
  • Energy Efficient Clustering Routing Protocol based on LEACH for WSN.International Journal of Computer Applications, June 2015 [NS2]
  • HEF Clustering for Secure and Efficient Data Transmission in CWSN. International Journal of Computer Applications, April 2015 [NS2]
  • Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN. International Journal of Computer Applications, April 2015 [NS2]
  • Energy Conservation Protocol using Sleep Scheduling in WSN. International Journal of Computer Applications, March 2015 [NS2]
  • Analysis of Random Walk Mobility Models with Location Heterogeneity, IEEE Transaction on Parallel and Distributed System, 2015 [NS2]
  • Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, March 2015.
  • A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks, Mobile Computing, IEEE Transactions on, February 2015. [NS2]
  • A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks, Networking, IEEE/ACM Transaction on, April 2015. [NS2]
  • Backoff Design for IEEE 802.11 DCF Networks: Fundamental Trade off and Design Criterion, Networking, IEEE/ACM Transaction on, February 2015. [NS2]
  • PDR And HOP Count based Routing for Efficient Energy Usage, International Journal of Computer Applications, June 2015 [NS2]
  • Energy-efficient Cluster-based Mechanism for WBAN Communications for Healthcare Applications,International Journal of Computer Applications, June 2015 [NS2]
  • Performance Evaluation of DSR and GRP under Black Hole Attack,International Journal of Computer Applications , June 2015 [NS2]
  • Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism,International Journal of Computer Applications, June 2015 [NS2]
  • Characteristic Analysis of Mobility using Heterogeneous Network,International Journal of Computer Applications, June 2015 [NS2]
  • Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement, International Journal of Computer Applications, June 2015 [NS2]
  • Hybrid Scheduling for Heterogeneous Asymmetric Mobile Communication,International Journal of Computer Applications, June 2015 [NS2]
  • Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks, Networking, IEEE/ACM Transaction on, May 2015. [NS2]
  • DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, April 2015 [NS2]
  • Distributed Information-Based Cooperative Strategy Adaptation in Opportunistic Mobile Networks, IEEE Transactions on Parallel and Distributed Systems, March 2015. [NS2]
  • Real Time Traffic Splitting and Efficient Flooding Mechanism in LSRP,International Journal of Computer Applications, May 2015 [NS2]
  • HOP-by-HOP Packet Forwarding Mechanism in Wireless Mesh Network, International Journal of Computer Applications, May 2015 [NS2]
  • Performance Comparison of different Congestion Control Protocols in Hybrid Network,International Journal of Computer Applications, May 2015 [NS2]
  • Efficient Routing in Zigbee Wireless Network using Shortcut Tree Routing.,International Journal of Computer Applications, May 2015 [NS2]
  • Performance Evaluation and Comparison of PDTMRP and MAODV,International Journal of Computer Applications, May 2015 [NS2]
  • Impact of Hello Interval on Performance of AODV Protocol,International Journal of Computer Applications, April 2015 [NS2]
  • An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters,International Journal of Computer
  • Applications, April 2015 [NS2]
  • Hybrid Protocol for Handling Security using SBPGP, International Journal of Computer Applications , April 2015 [NS2]
  • Efficient Multicast Delivery for Data Redundancy Minimization over Wireless Data Centers, IEEE Transactions on Emerging Topics in Computing, March 2015. [NS2]
  • Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks, IEEE/ACM Transactions on Networking, 2015. [NS2]
  • Enhancing Availability in Content Delivery Networks for Mobile Platforms, IEEE Transaction on Parallel and Distributed System, Aug. 2015. [NS2]
  • High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, April 2015. [NS2]
  • Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Neighbor Discovery in Wireless Networks with Multi-packet Reception, IEEE Transaction on Parallel and Distributed Systems, July 2015 [NS2]
  • Routing Pressure: A Channel-Related and Traffic-Aware Metric of Routing Algorithm, IEEE Transaction of Parallel and Distributed Systems, March 2015 [NS2]
  • The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • An Efficient Auction-based Mechanism for Mobile Data Offloading, IEEE Transactions on Mobile Computing, August 2015 [NS2]
  • Comparative Analysis of E-AOMDV and MC-AOMDV using Multi-criteria Multipath Routing,International Journal of Computer Applications , March 2015 [NS2]
  • Message Matching-based Artificial Bee Colony based Behaviour Detection in Delay Tolerant Networks,International Journal of Computer Applications, March 2015 [NS2]
  • New Protocol of Aggressive Packet Combining Scheme: An Extension to Throughput Comparison,International Journal of Computer Applications, March 2015 [NS2]
  • Performance Comparison of AODV and DSR Routing Protocols using Real Time Test-bed. International Journal of Computer Applications ,February 2015 [NS2]
  • Game Theory based Incentive Mechanisms in Delay Tolerant Network,International Journal of Computer Applications, April 2015 [NS2]
  • Concurrent Bandwidth Reservation Strategies for Big Data Transfers in HighPerformance Networks, IEEE Transactions on Network and Service Management, June 2015.
  •  Incentive Based Data Sharing in Delay Tolerant Mobile Networks, IEEE Transactions on Wireless Communications, January 2014 [NS2].
  • Technique to Improve the File Transfer Outcomes Between Road Side Unit and Vehicles in Vehicular Ad-Hoc Networks, International Conference on Computing, Communication and Automation, May 2015 [NS2].
  • A Reactive and Scalable Unicast Solution for Video Streaming over VANETs, IEEE Transaction on Computers, 2015 [NS2]
  • Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs , IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]
  • Isolating Packet Dropping Misbehavior in VANET Using Ant Colony Optimization, International Journal of Computer Applications, June 2015.
  • An Intersection based Traffic Monitoring using VANET, International Journal of Computer Applications, May 2015.
  • PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications,IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]