NS2
| Network Simulator(NS2) | ||
| DST KT C 01 | Asynchronous Device Detection for Cognitive Device-to-Device Communications | |
| DST KT C 02 | Fuzzy Logic-based Routing Algorithm for Lifetime Enhancement in Heterogeneous Wireless Sensor Networks | |
| DST KT C 03 | Modularity-based Dynamic Clustering for Energy Efficient UAVs aided Communications | |
| DST KT C 04 | Computation Offloading and Activation of Mobile Edge Computing Servers: A Minority Game | |
| DST KT C 05 | Spatio-Temporal Wireless Traffic Prediction with Recurrent Neural Network | |
| DST KT C 06 | A Learning Approach for Low-Complexity Optimization of Energy Efficiency in Multi-Carrier Wireless Networks | |
| DST KT C 07 | Optimizing Performance of Co-Existing Underlay Secondary Networks | |
| DST KT C 08 | Toward Optimal Power Control and Transfer for Energy Harvesting Amplify-and-Forward Relay Networks | |
| DST KT C 09 | Covert Communication Achieved by A Greedy Relay in Wireless Networks | |
| DST KT C 010 | Distance-based Inter-cell Interference Coordination in Small Cell Networks: Stochastic Geometry Modeling and Analysis | |
| DST KT C 011 | A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs | |
| DST KT C 012 | Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks | |
| DST KT C 013 | Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function | |
| DST KT C 014 | A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks | |
| DST KT C 015 | Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks | |
| DST KT C 016 | Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network | |
| DST KT C 017 | Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks | |
| DST KT C 018 | Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions | |
Branch: Computer Science
Topic: NS2 (2017-18)
| S.no. | Project code | Project theme | Technology | |
| 1 | ICDST-NS01 | Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks | Mobile Computing | |
| 2 | ICDST-NS02 | A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks | Mobile Computing | |
| 3 | ICDST-NS03 | A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks | Mobile Computing | |
| 4 | ICDST-NS04 | A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks | Mobile Computing | |
| 5 | ICDST-NS05 | A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks | Mobile Computing | |
| 6 | ICDST-NS06 | A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks | Mobile Computing | |
| 7 | ICDST-NS07 | CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes | Mobile Computing | |
| 8 | ICDST-NS08 | Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks | Mobile Computing | |
| 9 | ICDST-NS09 | Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks | Mobile Computing | |
| 10 | ICDST-NS10 | Cost-Effective Resource Allocation of Overlay Routing Relay Nodes | Mobile Computing | |
| 11 | ICDST-NS11 | Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach | Mobile Computing | |
| 12 | ICDST-NS12 | Delay Analysis of Multichannel Opportunistic Spectrum Access MAC protocol | Mobile Computing | |
| 14 | ICDST-NS14 | Efficient Interlayer Network Codes for Fair Layered Multicast Streaming | Mobile Computing | |
| 15 | ICDST-NS015 | Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks | Mobile Computing | |
| 16 | ICDST-NS16 | Enhanced Distance and Location Estimation for Broadband Wireless Networks | Mobile Computing | |
| 17 | ICDST-NS17 | Improving the Network Lifetime of MANETs through cooperative MAC Protocol Design | Mobile Computing | |
| 18 | ICDST-NS18 | Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m | Mobile Computing | |
| 19 | ICDST-NS19 | Joint Spectral Efficiency and Power Allocation Optimization in IEEE 802.16m | Mobile Computing | |
| 20 | ICDST-NS20 | Low-Overhead Control Channels in Wireless Networks | Mobile Computing | |
| 21 | ICDST-NS21 | Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers | Mobile Computing | |
| 22 | ICDST-NS22 | Monitoring the Impact of P2P Users on a Broadband Operator’s Network over Time | Mobile Computing | |
| 23 | ICDST-NS23 | Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks | Mobile Computing | |
| 15 | ICDST-NS15 | Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks | Mobile Computing | |
| 25 | ICDST-NS25 | Robust Estimators for Variance-Based Device-Free Localization and Tracking | Mobile Computing | |
| 26 | ICDST-NS26 | Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs | Mobile Computing | |
| 26 | ICDST-NS26 | Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs | Mobile Computing | |
| 27 | ICDST-NS27 | Secure data Aggregation technique for WSN in the presence of collusion attack | Mobile Computing | |
| 28 | ICDST-NS28 | Securing cognitive radio networks against primary user emulation attacks | Mobile Computing | |
| 29 | ICDST-NS29 | Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) | Mobile Computing | |
| 30 | ICDST-NS30 | SIR: a secure and intelligent routing protocol for vehicular ad hoc network | Mobile Computing | |
| 31 | ICDST-NS31 | SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays | Mobile Computing | |
| 32 | ICDST-NS32 | Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing | Mobile Computing | |
| 33 | ICDST-NS33 | User-Defined Privacy Grid System for Continuous Location-Based Services | Mobile Computing | |
| 34 | ICDST-NS34 | A Traffic Adaptive Multichannel MAC Protocol with Dynamic Slot Allocation for WSNs | Wireless Sensor Networking | |
| 35 | ICDST-NS35 | Cooperative Energy-Efficient Management of Federated WiFi Networks | Wireless Sensor Networking | |
| 36 | ICDST-NS36 | Detecting and Localizing Wireless Spoofing Attacks | Wireless Sensor Networking | |
| 37 | ICDST-NS37 | Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks | Wireless Sensor Networking | |
| 38 | ICDST-NS38 | Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach | Wireless Sensor Networking | |
| 39 | ICDST-NS39 | LEISURE: Load-Balanced Network-Wide Traffic Measurement and Monitor Placement | Wireless Sensor Networking | |
| 40 | ICDST-NS40 | Secure and Reliable Routing Protocols for heterogeneous multi-hop wireless networks | Mobile Computing | |
| 41 | ICDST-NS41 | Reducing Interferences in VANETs | Mobile Computing | |
| 42 | ICDST-NS42 | Energy-efficient cluster-head rotation in beacon-Enabled IEEE 802.15.4 Networks | Mobile Computing | |
| 43 | ICDST-NS43 | Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks | Mobile Computing | |
| 44 | ICDST-NS44 | D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks dow in Wireless Networks | Mobile Computing | |
| 45 | ICDST-NS45 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | |
| 46 | ICDST-NS46 | A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission | Wireless Sensor Networks, | |
| 47 | ICDST-NS47 | A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks | Wireless Sensor Networks, | |
| 48 | ICDST-NS48 | A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks | Mobile Computing | |
| 49 | ICDST-NS49 | A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Network | Wireless Sensor Networks, | |
| 50 | ICDST-NS50 | A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks | Wireless Sensor Networks, | |
| 51 | ICDST-NS51 | AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments | Wireless Sensor Networks, | |
| 52 | ICDST-NS52 | Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets | Networking | |
| 53 | ICDST-NS53 | An Attack-Resistant Trust Model based on Multidimensional trust Metrics in Underwater Acoustic Sensor Network | Mobile Computing | |
| 54 | ICDST-NS54 | An Efficient Distributed Trust Model for Wireless Sensor Networks | Wireless Sensor Networks, | |
| 55 | ICDST-NS55 | An Energy-Efficient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks | Wireless Sensor Networks, | |
| 56 | ICDST-NS56 | An Energy-efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks | Wireless Sensor Networks, | |
| 57 | ICDST-NS57 | An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks | Wireless Sensor Networks, | |
| 58 | ICDST-NS58 | An Overview and Assessment of Wireless Technologies and Co-existence of ZigBee, Bluetooth, and Wi-Fi Devices | Wireless Sensor Networks, | |
| 59 | ICDST-NS59 | Anomaly detection using forecasting methods ARIMA and HWDS | Wireless Sensor Networks, | |
| 60 | ICDST-NS60 | Body Node Coordinator Placement Algorithms for Wireless Body Area Networks | Networking | |
| 61 | ICDST-NS61 | By-Passing Infected Areas in Wireless Sensor Networks Using BPR | Wireless Sensor Networks, | |
| 62 | ICDST-NS62 | Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks | Wireless Sensor Networks, | |
| 63 | ICDST-NS63 | Congestion Control, Routing, and Scheduling in Wireless Networks With Interference Cancelation Capabilities | Wireless Sensor Networks, | |
| 64 | ICDST-NS64 | Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks | Wireless Sensor Networks, | |
| 65 | ICDST-NS65 | Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling | Wireless Sensor Networks, | |
| 66 | ICDST-NS66 | Decentralized robust spectrum allocation for cognitive radio wireless mesh networks | Networking | |
| 67 | ICDST-NS67 | Detection and prevention of wormhole attack in manet | Mobile Computing | |
| 68 | ICDST-NS68 | Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach | Mobile Computing | |
| 69 | ICDST-NS69 | Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks | Wireless Sensor Networks, | |
| 70 | ICDST-NS70 | EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks | Networking | |
| 71 | ICDST-NS71 | Effective Key Management in Dynamic Wireless Sensor Networks | Wireless Sensor Network | |
| 72 | ICDST-NS72 | Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks | Wireless Sensor Network | |
| 73 | ICDST-NS73 | Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network With Isolated Nodes | Wireless Sensor Network | |
| 74 | ICDST-NS74 | FluidNet: A Flexible Cloud-based Radio Access Network for Small Cells | Networking | |
| 75 | ICDST-NS75 | Fuzzy based Load and Energy Aware Multipath Routing for Mobile Ad Hoc Networks | Mobile Computing | |
| 76 | ICDST-NS76 | Geographic and Opportunistic Routing for Underwater Sensor Networks | Wireless Sensor Networks, | |
| 77 | ICDST-NS77 | Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network | Wireless Sensor Networks, | |
| 78 | ICDST-NS78 | HydroCast: Pressure Routing for Underwater Sensor Networks | Networking | |
| 79 | ICDST-NS79 | Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks | Wireless Sensor Networks, | |
| 80 | ICDST-NS80 | Integrated Energy and Spectrum Harvesting for 5G Wireless Communications | Networking | |
| 81 | ICDST-NS81 | Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks | Mobile Computing | |
| 82 | ICDST-NS82 | JellyFish attack: Analysis, detection, and countermeasure in TCP-based MANET | Wireless Sensor Networks, | |
| 83 | ICDST-NS83 | Low-Rate DoS Attacks Detection Based on Network Multifractal | Dependable and Secure Computing, | |
| 84 | ICDST-NS84 | Maximizing Network Topology Lifetime Using Mobile Node Rotation | Networking | |
| 85 | ICDST-NS85 | Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor | Mobile Computing | |
| 86 | ICDST-NS86 | Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET | Wireless Sensor Networks, | |
| 87 | ICDST-NS87 | Model and Protocol for Energ-Efficient Routing over Mobile Ad Hoc Networks | Wireless Sensor Networks, | |
| 88 | ICDST-NS88 | Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks | Wireless Sensor Networks, | |
| 89 | ICDST-NS89 | Neuro-Fuzzy Systems: State-of-the-art Modeling Techniques | Mobile Computing | |
| 90 | ICDST-NS90 | On-Demand Discovery of Software Service Dependencies in MANETs | Wireless Sensor Networks, | |
| 91 | ICDST-NS91 | Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks | Wireless Sensor Networks, | |
| 92 | ICDST-NS92 | Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks | Wireless Sensor Networks, | |
| 93 | ICDST-NS93 | Performance analysis of AODV, DSR and ZRP routing protocols in MANET using directional antenna | Wireless Sensor Networks, | |
| 94 | ICDST-NS94 | Predictive Data Delivery to Mobile Users through Mobility Learning in Wireless Sensor Networks | Wireless Sensor Networks, | |
| 95 | ICDST-NS95 | Privacy Protection for Wireless Medical Sensor Data | Wireless Sensor Networks, | |
| 96 | ICDST-NS96 | PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks | Wireless Sensor Networks, | |
| 97 | ICDST-NS97 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | Wireless Sensor Networks, | |
| 98 | ICDST-NS98 | Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning | Wireless Sensor Networks, | |
| 99 | ICDST-NS99 | Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks | Wireless Sensor Networks, | |
| 100 | ICDST-NS100 | Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment | Wireless Sensor Networks, | |
| 101 | ICDST-NS101 | SWIMMING: Seamless and Efficient WiFi-Based Internet Access from Moving Vehicles | Mobile Computing | |
| 102 | ICDST-NS102 | The Beauty of the Commons: Optimal Load Sharing by Base Station Hopping in Wireless Sensor Networks | Wireless Sensor Networks, | |
| 103 | ICDST-NS103 | The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities | Mobile Computing | |
| 104 | ICDST-NS104 | The Role of Location Popularity in Multicast Mobile Ad Hoc Networks | ||
| 105 | ICDST-NS105 | Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation | Wireless Sensor Networks, | |
| 106 | ICDST-NS106 | Wireless Resource Allocation in Next Generation Healthcare Facilities | Wireless Sensor Networks | |
| 107 | ICDST-NS107 | A Heuristic Coordination Framework for Self-Optimizing Mechanisms in LTE HetNets | Wireless Sensor Networks, | |
| 108 | ICDST-NS108 | A Hierarchical Packet Forwarding Mechanism for Energy Harvesting Wireless Sensor Networks | Wireless Sensor Networks, | |
| 109 | ICDST-NS109 | A Hierarchical Packet Forwarding Mechanism for Energy Harvesting Wireless Sensor Networks | Wireless Sensor Networks, | |
| 110 | ICDST-NS110 | A Hierarchical Packet Forwarding Mechanism for Energy Harvesting Wireless Sensor Networks | Wireless Sensor Networks, | |
| 111 | ICDST-NS111 | a multi-interface multi-channel routing (MMCR) protocol for wireless ad hoc networks | Wireless Sensor Networks, |
INSIGHT






