ns3 ieee projects

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we…

Posted in NS2 Projects | Tagged , | Leave a comment

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network…

Posted in NS2 Projects | Tagged , , | Leave a comment

Detection of node failure in mobile wireless networks A probablistic approach

Detection of node failure in mobile wireless networks A probablistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection…

Posted in NS2 Projects | Tagged , , | Leave a comment

Trust Based Certificate Revocation of Malicious Nodes in MANET

Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate…

Posted in NS2 Projects | Leave a comment

GradeTrust: A Secure Trust Based Routing Protocol For MANETs

Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks…

Posted in NS2 Projects | Tagged , , , | Leave a comment

Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs

The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs…

Posted in NS2 Projects | Tagged | 1 Comment

Trust Based Secure Routing in Delay Tolerant Networks

There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP…

Posted in NS2 Projects | Tagged , , | Leave a comment

Content centric routing in IoT networks and its integration in RPL

Internet of Things (IoT) networks can be used for many applications across different industry domains in- cluding infrastructure monitoring, civil service, security and surveillance applications etc. However, gath- ering large amounts of data from such networks including images and videos often cause traffic con- gestion in the central network area. In order to solve this…

Posted in NS2 Projects | Tagged , , , , | Leave a comment

Target Tracking in Wireless Sensor Network

Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for…

Posted in NS2 Projects | Tagged , , , , , | Leave a comment

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons.…

Posted in NS2 Projects | Tagged , , , , , , , , , , | Leave a comment