Latest IEEE NS2 Project Titles 2016 - 2017
With surplus growth in the number of smart phone users, Android Apps are flooding in the market. After Symbian and IOS, Android is reaching to the heights in the number of users. This makes Android to take front row of mobile OS which was previously dominated by other operating systems. With this view we propose some very interesting projects in the following IEEE NS2 project title list.
IEEE NS2 Final Year Projects
Mobile: 9008611118 projects@diginetonline.com
Project Code |
IEEE 2016-17 NS2 Project Titles |
Domain | Language Year |
---|---|---|---|
N1601 | A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks | MANET | NS2/2016 |
N1602 | D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks | MANET | NS2/2016 |
N1603 | Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks | MANET | NS2/2016 |
N1604 | Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks | MANET | NS2/2016 |
N1605 | Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes | MANET | NS2/2016 |
N1606 | Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks | MANET | NS2/2016 |
N1607 | Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs | MANET | NS2/2016 |
JPN1608 | Resisting Blackhole Attacks on MANETs | MANET (IEEE CONFERENCE) | NS2/2016 |
JPN1609 | A Kautz-Based Wireless Sensor and Actuator Network for Real-Time, Fault-Tolerant and Energy-Efficient Transmission | WSN (Routing) | NS2/2016 |
JPN1610 | CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1611 | Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles | WSN (Routing) | NS2/2016 |
JPN1612 | Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks | WSN (Routing) | NS2/2016 |
JPN1613 | DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1614 | Dictionary Based Secure Provenance Compression for Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1615 | Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1616 | Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1617 | Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1618 | Geographic and Opportunistic Routing for Underwater Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1619 | iPath: Path Inference in Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1620 | Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1621 | Location aware sensor routing protocol for mobile wireless sensor networks | WSN (Routing) | NS2/2016 |
JPN1622 | Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink | WSN (Routing) | NS2/2016 |
JPN1623 | Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple Sinks | WSN (Routing) | NS2/2016 |
JPN1624 | Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions | WSN (Routing) | NS2/2016 |
JPN1625 | NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1626 | Privacy-Preserving Data Aggregation in Mobile Phone Sensing | WSN (Routing) | NS2/2016 |
JPN1627 | RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1628 | Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks | WSN (Routing) | NS2/2016 |
JPN1629 | DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor Networks | UWSN (Routing) | NS2/2016 |
JPN1630 | A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks | WSN (Security) | NS2/2016 |
JPN1631 | ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks | WSN (Security) | NS2/2016 |
JPN1632 | Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks | WSN (Security) | NS2/2016 |
JPN1633 | Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing | WSN (Security) | NS2/2016 |
JPN1634 | Energy and Memory Efficient Clone Detection in Wireless Sensor Networks | WSN (Security) | NS2/2016 |
JPN1635 | PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks | WSN (Security) | NS2/2016 |
JPN1636 | Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes | WSN (Security) | NS2/2016 |
JPN1637 | Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs | WSN (Security) | NS2/2016 |
JPN1638 | A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks | VANET | NS2/2016 |
JPN1639 | A Threshold Anonymous Authentication Protocol for VANETs | VANET | NS2/2016 |
JPN1640 | ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks | VANET | NS2/2016 |
JPN1641 | Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc Networks | VANET | NS2/2016 |
JPN1642 | Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks | VANET | NS2/2016 |
JPN1643 | DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance | VANET | NS2/2016 |
JPN1644 | Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks | VANET | NS2/2016 |
JPN1645 | LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle- to-Vehicle Safety Communications | VANET | NS2/2016 |
JPN1646 | SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks | VANET | NS2/2016 |
JPN1647 | Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs | VANET | NS2/2016 |
JPN1648 | A Hop-by-Hop Routing Mechanism for Green Internet | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1649 | Achieving Optimal Traffic Engineering Using a Generalized Routing Framework | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1650 | Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1651 | Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1652 | Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures) | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1653 | Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1654 | DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1655 | Dynamic Network Control for Confidential Multi-Hop Communications | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1656 | Embedding IP Unique Shortest Path Topology on a Wavelength- Routed Network: Normal and Survivable Design | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1657 | Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks | Internet of Things (IoT) | NS2/2016 |
JPN1658 | Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing | WIRELESS COMMUNICATIONS | NS2/2016 |
JPN1659 | LAAEM: A Method to Enhance LDoS Attack | SECURE COMPUTING | NS2/2016 |
JPN1660 | Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature | SECURE COMPUTING | NS2/2016 |
JPN1661 | PROVEST: Provenance-based Trust Model for Delay Tolerant Networks | SECURE COMPUTING | NS2/2016 |
JPN1662 | Routing Protocol for Heterogeneous Wireless Mesh Networks | Mesh Networks | NS2/2016 |
JPN1663 | Opportunistic Piggyback Marking for IP Traceback | SECURE COMPUTING | NS2/2016 |
JPN1664 | Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme | SECURE COMPUTING | NS2/2016 |
JPN1665 | Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding | SECURE COMPUTING | NS2/2016 |
JPN1666 | Thwarting Selfish Behavior in 802.11 WLANs | NETWORKING | NS2/2016 |
JPN1667 | Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive Networks | COGNITIVE NETWORK | NS2/2016 |
JPN1668 | Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach | MOBILE COMPUTING | NS2/2016 |
JPN1669 | Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small Cells | MOBILE COMPUTING | NS2/2016 |
JPN1670 | Robotic Message Ferrying for Wireless Networks using Coarse- Grained Backpressure Control | MOBILE COMPUTING | NS2/2016 |
JPN1671 | TCP-Aware Backpressure Routing and Scheduling | MOBILE COMPUTING | NS2/2016 |
JPN1672 | Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks | MOBILE COMPUTING | NS2/2016 |