NS2 Projects

NS2 projects Titles 2012 NS2 Projects Wireless Sensor Networks ns2 projects 1.Fast Data Collection in Tree-Based Wireless Sensor Networks –ABSTRACT & DEMO 2.oneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing – ABSTRACT & DEMO 3.Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – ABSTRACT & DE MO 4.Cut Detection in Wireless Sensor Networks – ABSTRACT & DEMO 5.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks – ABSTRACT & DEMO 6.    The Three-Tier Security Scheme in Wireless Sensor…

Read More

Load Shedding in Mobile Systems with MobiQual

  Load Shedding in Mobile Systems with MobiQual   In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To attain accuracy, the CQ server must receive and process frequent position updates from the mobile nodes. However, it is often difficult to obtain fresh and accurate CQ results simultaneously, due to 1) limited resources in computing and communication and 2) fast-changing load conditions caused by continuous mobile node movement. Hence, a key…

Read More

Novel Defense Mechanism Against Data Flooding Attacks In Wireless Ad Hoc Networks

Technology Used: Java Consumer Electronics, 2010 Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there…

Read More

Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In WMNS

Technology Used: Java Wireless Communications, 2010 In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With such an attack, a misbehaving mesh router just forwards a subset of the packets it receives but drops the others. While most of the existing studies on selective forwarding attacks focus on attack detection under the assumption of an error-free wireless channel, we consider a more practical and challenging scenario that packet dropping may be…

Read More