NS2 projects Titles 2012 NS2 Projects Wireless Sensor Networks ns2 projects 1.Fast Data Collection in Tree-Based Wireless Sensor Networks –ABSTRACT & DEMO 2.oneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing – ABSTRACT & DEMO 3.Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – ABSTRACT & DE MO 4.Cut Detection in Wireless Sensor Networks – ABSTRACT & DEMO 5.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks – ABSTRACT & DEMO 6.   The Three-Tier Security Scheme in Wireless Sensor…
Read MoreCategory: final year project
Final year project for computer science and information technology students provided guidance from us. Bachelor of engineering and master of engineering B.E/B.Tech and M.E/M.Tech students can get project idea / guidance from us
Integration of Sound Signature in Graphical Password Authentication System
Integration of Sound Signature in Graphical Password Authentication System
Read MoreCooperative Download in Vehicular Environments
Cooperative Download in Vehicular Environments
Read MoreEmbedded Extended Visual Cryptography Schemes
Embedded Extended Visual Cryptography Schemes
Read MoreEFFICIENT APPROXIMATE QUERY PROCESSING IN PEER TO PEER NETWORKS
EFFICIENT APPROXIMATE QUERY PROCESSING IN PEER TO PEER NETWORKS
Read MorePrivacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Read MoreLoad Shedding in Mobile Systems with MobiQual
Load Shedding in Mobile Systems with MobiQual In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To attain accuracy, the CQ server must receive and process frequent position updates from the mobile nodes. However, it is often difficult to obtain fresh and accurate CQ results simultaneously, due to 1) limited resources in computing and communication and 2) fast-changing load conditions caused by continuous mobile node movement. Hence, a key…
Read MoreOnline Adaptive Compression in Delay Sensitive Wireless Sensor Networks
Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks
Read MoreNovel Defense Mechanism Against Data Flooding Attacks In Wireless Ad Hoc Networks
Technology Used: Java Consumer Electronics, 2010 Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there…
Read MoreMitigating Selective Forwarding Attacks With A Channel-Aware Approach In WMNS
Technology Used: Java Wireless Communications, 2010 In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With such an attack, a misbehaving mesh router just forwards a subset of the packets it receives but drops the others. While most of the existing studies on selective forwarding attacks focus on attack detection under the assumption of an error-free wireless channel, we consider a more practical and challenging scenario that packet dropping may be…
Read More