| S.no. |
Project code |
Project theme |
Technology |
Download |
| 1 |
ICDST-NS01 |
Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks |
Mobile Computing |
|
| 2 |
ICDST-NS02 |
A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks |
Mobile Computing |
|
| 3 |
ICDST-NS03 |
A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
Mobile Computing |
|
| 4 |
ICDST-NS04 |
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks |
Mobile Computing |
|
| 5 |
ICDST-NS05 |
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks |
Mobile Computing |
|
| 6 |
ICDST-NS06 |
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks |
Mobile Computing |
|
| 7 |
ICDST-NS07 |
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes |
Mobile Computing |
|
| 8 |
ICDST-NS08 |
Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks |
Mobile Computing |
|
| 9 |
ICDST-NS09 |
Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks |
Mobile Computing |
|
| 10 |
ICDST-NS10 |
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes |
Mobile Computing |
|
| 11 |
ICDST-NS11 |
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach |
Mobile Computing |
|
| 12 |
ICDST-NS12 |
Delay Analysis of Multichannel Opportunistic Spectrum Access MAC protocol |
Mobile Computing |
|
| 13 |
ICDST-NS13 |
Device-to-device communications for enhancing quality of experience in software defined multi-tier LTE-A networks |
Mobile Computing |
|
| 14 |
ICDST-NS14 |
Efficient Interlayer Network Codes for Fair Layered Multicast Streaming |
Mobile Computing |
|
| 15 |
ICDST-NS015 |
Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks |
Mobile Computing |
|
| 16 |
ICDST-NS16 |
Enhanced Distance and Location Estimation for Broadband Wireless Networks |
Mobile Computing |
|
| 17 |
ICDST-NS17 |
Improving the Network Lifetime of MANETs through cooperative MAC Protocol Design |
Mobile Computing |
|
| 18 |
ICDST-NS18 |
Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m |
Mobile Computing |
|
| 19 |
ICDST-NS19 |
Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m |
Mobile Computing |
|
| 20 |
ICDST-NS20 |
Low-Overhead Control Channels in Wireless Networks |
Mobile Computing |
|
| 21 |
ICDST-NS21 |
Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers |
Mobile Computing |
|
| 22 |
ICDST-NS22 |
Monitoring the Impact of P2P Users on a Broadband Operator’s Network over Time |
Mobile Computing |
|
| 23 |
ICDST-NS23 |
Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks |
Mobile Computing |
|
| 24 |
ICDST-NS24 |
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks |
Mobile Computing |
|
| 25 |
ICDST-NS25 |
Robust Estimators for Variance-Based Device-Free Localization and Tracking |
Mobile Computing |
|
| 26 |
ICDST-NS26 |
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs |
Mobile Computing |
|
| 27 |
ICDST-NS27 |
Secure data Aggregation technique for WSN in the presence of collusion attack |
Mobile Computing |
|
| 28 |
ICDST-NS28 |
Securing cognitive radio networks against primary user emulation attacks
|
Mobile Computing |
|
| 29 |
ICDST-NS29 |
Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) |
Mobile Computing |
|
| 30 |
ICDST-NS30 |
SIR: a secure and intelligent routing protocol for vehicular ad hoc network |
Mobile Computing |
|
| 31 |
ICDST-NS31 |
SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays |
Mobile Computing |
|
| 32 |
ICDST-NS32 |
Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing |
Mobile Computing |
|
| 33 |
ICDST-NS33 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
Mobile Computing |
|
| 34 |
ICDST-NS34 |
A Traffic Adaptive Multi-channel MAC Protocol with Dynamic Slot Allocation for WSNs |
Wireless Sensor Networking |
|
| 35 |
ICDST-NS35 |
Cooperative Energy-Efficient Management of Federated WiFi Networks |
Wireless Sensor Networking |
|
| 36 |
ICDST-NS36 |
Detecting and Localizing Wireless Spoofing Attacks |
Wireless Sensor Networking |
|
| 37 |
ICDST-NS37 |
Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks |
Wireless Sensor Networking |
|
| 38 |
ICDST-NS38 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
Wireless Sensor Networking |
|
| 39 |
ICDST-NS39 |
LEISURE: Load-Balanced Network-Wide Traffic Measurement and Monitor Placement |
Wireless Sensor Networking |
|
| 40 |
ICDST-NS40 |
Secure and Reliable Routing Protocols for heterogeneous multi hop wireless networks |
Mobile Computing |
|
| 41 |
ICDST-NS41 |
Reducing Interferences in VANETs |
Mobile Computing |
|
| 42 |
ICDST-NS42 |
Energy-efficient cluster-head rotation in beacon-Enabled IEEE 802.15.4 Networks |
Mobile Computing |
|
| 43 |
ICDST-NS43 |
Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks |
Mobile Computing |
|
| 44 |
ICDST-NS44 |
D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks dow in Wireless Networks |
Mobile Computing |
|
| 45 |
ICDST-NS45 |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
Mobile Computing |
|
| 46 |
ICDST-NS46 |
A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission |
Wireless Sensor Networks, |
|
| 47 |
ICDST-NS47 |
A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks |
Wireless Sensor Networks, |
|
| 48 |
ICDST-NS48 |
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks |
Mobile Computing |
|
| 49 |
ICDST-NS49 |
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Network |
Wireless Sensor Networks, |
|
| 50 |
ICDST-NS50 |
A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 51 |
ICDST-NS51 |
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments |
Wireless Sensor Networks, |
|
| 52 |
ICDST-NS52 |
Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets |
Networking |
|
| 53 |
ICDST-NS53 |
An Attack-Resistant Trust Model based on Multidimensional trust Metrics in Underwater Acoustic Sensor Network |
Mobile Computing |
|
| 54 |
ICDST-NS54 |
An Efficient Distributed Trust Model for Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 55 |
ICDST-NS55 |
An Energy-Efficient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 56 |
ICDST-NS56 |
An Energy-efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks |
Wireless Sensor Networks, |
|
| 57 |
ICDST-NS57 |
An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks
|
Wireless Sensor Networks, |
|
| 58 |
ICDST-NS58 |
An Overview and Assessment of Wireless Technologies and Co-existence of ZigBee, Bluetooth and Wi-Fi Devices |
Wireless Sensor Networks, |
|
| 59 |
ICDST-NS59 |
Anomaly detection using forecasting methods ARIMA and HWDS |
Wireless Sensor Networks, |
|
| 60 |
ICDST-NS60 |
Body Node Coordinator Placement Algorithms for Wireless Body Area Networks |
Networking |
|
| 61 |
ICDST-NS61 |
By-Passing Infected Areas in Wireless Sensor Networks Using BPR |
Wireless Sensor Networks, |
|
| 62 |
ICDST-NS62 |
Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks |
Wireless Sensor Networks, |
|
| 63 |
ICDST-NS63 |
Congestion Control, Routing, and Scheduling in Wireless Networks With Interference Cancelation Capabilities |
Wireless Sensor Networks, |
|
| 64 |
ICDST-NS64 |
Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 65 |
ICDST-NS65 |
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling |
Wireless Sensor Networks, |
|
| 66 |
ICDST-NS66 |
Decentralized robust spectrum allocation for cognitive radio wireless mesh networks |
Networking |
|
| 67 |
ICDST-NS67 |
Detection and prevention of wormhole attack in manet |
Mobile Computing |
|
| 68 |
ICDST-NS68 |
Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach |
Mobile Computing |
|
| 69 |
ICDST-NS69 |
Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 70 |
ICDST-NS70 |
EDAL:AnEnergy-Efficient,Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks |
Networking |
|
| 71 |
ICDST-NS71 |
Effective Key Management in Dynamic Wireless Sensor Networks |
Wireless Sensor Network |
|
| 72 |
ICDST-NS72 |
Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks |
Wireless Sensor Network |
|
| 73 |
ICDST-NS73 |
Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network With Isolated Nodes |
Wireless Sensor Network |
|
| 74 |
ICDST-NS74 |
FluidNet: A Flexible Cloud-based Radio Access Network for Small Cells |
Networking |
|
| 75 |
ICDST-NS75 |
Fuzzy based Load and Energy Aware Multipath Routing for Mobile Ad Hoc Networks |
Mobile Computing |
|
| 76 |
ICDST-NS76 |
Geographic and Opportunistic Routing for Underwater Sensor Networks |
Wireless Sensor Networks, |
|
| 77 |
ICDST-NS77 |
Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network |
Wireless Sensor Networks, |
|
| 78 |
ICDST-NS78 |
HydroCast: Pressure Routing for Underwater Sensor Networks |
Networking |
|
| 79 |
ICDST-NS79 |
Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks |
Wireless Sensor Networks, |
|
| 80 |
ICDST-NS80 |
Integrated Energy and Spectrum Harvesting for 5G Wireless Communications |
Networking |
|
| 81 |
ICDST-NS81 |
Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks |
Mobile Computing |
|
| 82 |
ICDST-NS82 |
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET |
Wireless Sensor Networks, |
|
| 83 |
ICDST-NS83 |
Low-Rate DoS Attacks Detection Based on Network Multifractal |
Dependable and Secure Computing, |
|
| 84 |
ICDST-NS84 |
Maximizing Network Topology Lifetime Using Mobile Node Rotation |
Networking |
|
| 85 |
ICDST-NS85 |
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor |
Mobile Computing |
|
| 86 |
ICDST-NS86 |
Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET |
Wireless Sensor Networks, |
|
| 87 |
ICDST-NS87 |
Model and Protocol for Energy Efficient Routing over Mobile Ad Hoc Networks |
Wireless Sensor Networks, |
|
| 88 |
ICDST-NS88 |
Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks |
Wireless Sensor Networks, |
|
| 89 |
ICDST-NS89 |
Neuro Fuzzy Systems: State-of-the-art Modeling Techniques |
Mobile Computing |
|
| 90 |
ICDST-NS90 |
On-Demand Discovery of Software Service Dependencies in MANETs |
Wireless Sensor Networks, |
|
| 91 |
ICDST-NS91 |
Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 92 |
ICDST-NS92 |
Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 93 |
ICDST-NS93 |
Performance analysis of AODV, DSR and ZRP routing protocols in MANET using directional antenna |
Wireless Sensor Networks, |
|
| 94 |
ICDST-NS94 |
Predictive Data Delivery to Mobile Users through Mobility Learning in Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 95 |
ICDST-NS95 |
Privacy Protection for Wireless Medical Sensor Data |
Wireless Sensor Networks, |
|
| 96 |
ICDST-NS96 |
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks |
Wireless Sensor Networks, |
|
| 97 |
ICDST-NS97 |
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 98 |
ICDST-NS98 |
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning |
Wireless Sensor Networks, |
|
| 99 |
ICDST-NS99 |
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks |
Wireless Sensor Networks, |
|
| 100 |
ICDST-NS100 |
Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment |
Wireless Sensor Networks, |
|