NS3 projects

Spread the love

 

 

Improving Safety on Drivers for Vehicular Ad Hoc Networks

Improving Safety on Drivers for Vehicular Ad Hoc Networks Need for individualizing vehicular communications in order to improve safety for a highway scenario. Adapting a vehicular ad hoc network to both its individual driver’s characteristic and traffic conditions enables it to transmit in a smart manner to other vehicles. This radical improvement is now possible […]

Posted in NS2 Projects | Leave a comment

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we […]

Posted in NS2 Projects | Tagged | Leave a comment

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network […]

Posted in NS2 Projects | Tagged | Leave a comment

Detection of node failure in mobile wireless networks A probabilistic approach

Detection of node failure in mobile wireless networks A probabilistic approach Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection […]

Posted in NS2 Projects | Tagged | Leave a comment

Trust Based Certificate Revocation of Malicious Nodes in MANET

Trust Based Certificate Revocation of Malicious Nodes in MANET MANET (Mobile Ad hoc Network) is an autonomous, robustness and scalable system of mobile nodes communicating via wireless links with no rigid infrastructure. Owing to the independent and dynamic nature of mobile nodes, topology of MANET often changes and is prone to various attacks. To eradicate […]

Posted in NS2 Projects | Leave a comment

GradeTrust: A Secure Trust Based Routing Protocol For MANETs

Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks […]

Posted in NS2 Projects | Tagged , | Leave a comment

Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs

The applications of wireless sensor networks (WSNs) have been increased due to its vast potential to connect the physical world to the virtual world. Also, an advance in microelectronic fabrication technology reduces the cost of manufacturing portable wireless sensor nodes. It becomes a trend to deploy the large numbers of portable wireless sensors in WSNs […]

Posted in NS2 Projects | Tagged | 1 Comment

Trust Based Secure Routing in Delay Tolerant Networks

There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicle applications. This class of networks requires the modification of traditional routing and security protocols, such as TCP/IP […]

Posted in NS2 Projects | Tagged , | Leave a comment

Target Tracking in Wireless Sensor Network

Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for […]

Posted in NS2 Projects | Tagged , , , , , | Leave a comment

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. […]

Posted in NS2 Projects | Tagged , , , , , , , , | Leave a comment

Related links for NS3 Projects: