NS3 projects

 

 

Detection of node failure in mobile wireless networks A probablistic approach

Detection of node failure in mobile wireless networks A probablistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection…

Posted in NS2 Projects | Tagged , , | Leave a comment

Trust Based Certificate Revocation of Malicious Nodes in MANET

Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate…

Posted in NS2 Projects | Leave a comment

GradeTrust: A Secure Trust Based Routing Protocol For MANETs

Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks…

Posted in NS2 Projects | Tagged , , , | Leave a comment

Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs

The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs…

Posted in NS2 Projects | Tagged | 1 Comment

Trust Based Secure Routing in Delay Tolerant Networks

There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP…

Posted in NS2 Projects | Tagged , , | Leave a comment

Content centric routing in IoT networks and its integration in RPL

Internet of Things (IoT) networks can be used for many applications across different industry domains in- cluding infrastructure monitoring, civil service, security and surveillance applications etc. However, gath- ering large amounts of data from such networks including images and videos often cause traffic con- gestion in the central network area. In order to solve this…

Posted in NS2 Projects | Tagged , , , , | Leave a comment

Target Tracking in Wireless Sensor Network

Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for…

Posted in NS2 Projects | Tagged , , , , , | Leave a comment

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons.…

Posted in NS2 Projects | Tagged , , , , , , , , , , | Leave a comment

Trust Management for Defending On-Off Attacks

Trust Management for Defending On-Off Attacks A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust. However, if a malicious node tries to disguise its malicious…

Posted in NS2 Projects | Tagged , , , , , , , , , | Leave a comment

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such…

Posted in NS2 Projects | Tagged , , , , , , | Leave a comment

Related links for NS3 Projects: