NS2 IEEE PROJECT'S


1 Multi-Node Wireless Energy Charging in Sensor Networks

2 Mobile application security: malware threats and defenses

3 VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks

4 Wireless communications for vehicular safety

5 Opportunistic communications in interference alignment networks with wireless power transfer

6 Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality

7 A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks

8 Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks

9 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation

10 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

11 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

12 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

13 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter

14 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

15 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks

16 Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks

17 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

18 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

19 On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

20 A Hierarchical Account-Aided Reputation Management System for MANETs

21 Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach

22 On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications

23 Multipath TCP: Analysis, Design, and Implementation

24 On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks

25 Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications

26 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

27 Authenticated Key Exchange Protocols for Parallel Network File Systems

28 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

29 Decentralized Computation Offloading Game for Mobile Cloud Computing

30 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

31 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

32 Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm

33 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

34 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

35 Breaking the vehicular wireless communications barriers: Vertical handover techniques for heterogeneous networks

36 Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks

37 Adaptive Intelligent Middleware Architecture for Mobile Real-time Communications

38 Dynamic Routing for Flying Ad Hoc Networks

39 Effect of Mobility on the Outage and BER Performances of

40 Digital Transmissions over Nakagami-m Fading Channels

41 Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

42 MERVS: A Novel Multi-channel Error Recovery Video Streaming Protocol for Vehicle Ad-hoc Network

43 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

44 On the Throughput and Delay in Ad Hoc Networks With Human Mobility

45 On-Demand Discovery of Software Service Dependencies in MANETs

46 Probabilistic Key Pre-distribution for Heterogeneous Mobile Ad hoc Networks Using Subjective Logic

47 Restoring Connectivity of Mobile Robotic Sensor Networks While Avoiding Obstacles

48 The FINS Framework: Design and Implementation of the Flexible Internetwork Stack (FINS) Framework

49 2FLIP: A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET

50 A New Decentralized Bayesian Approach for Cooperative Vehicle Localization Based on Fusion of GPS and VANET Based Inter-Vehicle Distance Measurement

51 A Threshold Anonymous Authentication Protocol for VANETs

52 Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET

53 Gateway Placement and Packet Routing For Multihop In-Vehicle Internet Access

54 Multi-Hop Cluster based IEEE 802.11p and LTE Hybrid Architecture for VANET Safety Message Dissemination

55 Optimizing the Control Channel Interval of the DSRC for Vehicular Safety Applications

56 Understanding spurious message forwarding in VANET beacon-less dissemination protocols: an analytical approach

57 V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs

58 VANET-Cloud: A Generic Cloud Computing Model For Vehicular Ad Hoc Networks

59 A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs

60 A Novel Wireless Mobile Platform to Locate and Gather Data From Optical Fiber Sensors Integrated Into a WSN

61 A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks

62 Application-Specific Customization of Dynamic Profiling Mechanisms for Sensor Networks

63 Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks

64 Energy Efficient COGnitive MAC for Sensor Networks under WLAN Co-existence

65 HMM-Based Decision Fusion in Wireless Sensor Networks With Noncoherent Multiple Access

66 HYRMA: A Hybrid Routing Protocol for Marine Environments Monitoring

67 Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack

68 Optimal Resource Allocation for Detection of a Gaussian Process Using a MAC in WSNs

69 Scalable Data-Coupled Clustering for Large Scale WSN

70 Sensors Augmentation Influence over Trust and Reputation Models Realization for Dense Wireless Sensor Networks

71 User Privacy And Data Trustworthiness In Mobile Crowd Sensing

72 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation

73 Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity

74 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

75 Dynamic Openflow-Controlled Optical Packet Switching Network

76 Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks

77 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

78 Privacy-Preserving Detection of Sensitive Data Exposure

79 Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking

80 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

81 Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

82 Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques

83 Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks

84 Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks

85 Self-Organizing Resource Management Framework in OFDMA Femtocells

86 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics

87 Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks

88 A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks

89 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks

90 Authenticated Key Exchange Protocols for Parallel Network File Systems

91 Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs

92 Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks

93 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

94 Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks

95 Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

96 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

97 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

98 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

99 Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm