These below Latest 2015-2016 NS2 Projects developed for Final Year Students of B.Tech & M.Tech. We Provide NS2 Project Training and Paper Implementation, Project documentation Preparation with PPT Presentation with affordable price.
| Sl.No | Project Title | Year |
| 1 | Joint Access Control and Resource Allocation for Concurrent and Massive Access of M2M Devices | 2015 |
| 2 | Downlink Power Control in Self-Organizing Dense Small Cells Underlaying Macrocells: A Mean Field Game | 2015 |
| 3 | Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks | 2015 |
| 4 | Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks | 2015 |
| 5 | Greening Geographical Load Balancing | 2015 |
| 6 | A Hierarchical Account-Aided Reputation Management System for MANETs | 2015 |
| 7 | Utility Fair Optimization of Antenna Tilt Angles in LTE Net works | 2015 |
| 8 | Efficient Allocation Of Periodic Feedback Channels In Broadband Wireless Networks | 2015 |
| 9 | Proportional Fair Coding For wireless mesh Networks | 2015 |
| 10 | Exploiting Asynchronous Amplify-And-Forward Relays To Enhance The Performance Of Ieee 802.11 Networks | 2015 |
| 11 | Cellular Architecture And Key Technologies For 5g Wireless Communication Networks | 2015 |
| 12 | Energy-Efficient Sensor Scheduling Algorithm in Cognitive Radio Networks Employing Heterogeneous Sensors | 2015 |
| 13 | Opportunistic Spectrum Access with Two Channel Sensing in Cognitive Radio Networks 14 Optimal Scheduling for Multi-Radio Multi-Channel Multi-Hop Cognitive Cellular Networks | 2015 |
| 14 | DSCA: Dynamic Spectrum Co-Access Between the Primary Users and the Secondary Users | 2015 |
| 15 | On Joint Power and Admission Control in Underlay Cellular Cognitive Radio Networks | 2015 |
| 16 | Cooperative Relay Selection in Cognitive Radio Networks | 2015 |
| 17 | Statistical Modeling of Spectrum Sensing Energy in Multi-Hop Cognitive Radio Networks | 2015 |
| 18 | Adaptive Random Access for Cooperative Spectrum Sensing in Cognitive Radio Networks | 2015 |
| 19 | Robust Power Control Under Location and Channel Uncertainty in Cognitive Radio Networks | 2015 |
| 20 | Energy Efficient Collaborative Spectrum Sensing Based on Trust Management in Cognitive Radio Networks | 2015 |
| 21 | Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design | 2015 |
| 22 | A Hierarchical Account-Aided Reputation Management System for MANETs | 2015 |
| 23 | Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach | 2015 |
| 24 | Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics | 2015 |
| 25 | Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET | 2015 |
| 26 | BRACER: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance | 2015 |
| 27 | Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks | 2015 |
| 28 | Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks | 2015 |
| 29 | CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes | 2015 |
| 30 | Estimating the Available Medium Access Bandwidth of IEEE 802.11 Ad Hoc Networks with Concurrent Transmissions | 2015 |
| 31 | Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach | 2015 |
| 32 | Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks | 2015 |
| 33 | Maximum Lifetime Scheduling for Target Coverage and Data Collection in Wireless Sensor Networks | 2015 |
| 34 | Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks | 2015 |
| 35 | Joint Cooperative Routing and Power Allocation for Collision Minimization in Wireless Sensor Networks With Multiple Flows | 2015 |
| 36 | PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network | 2015 |
| 37 | A Spectral Clustering Approach to Identifying Cuts in Wireless Sensor Networks | 2015 |
| 38 | Non cooperative Game-Based Energy Welfare Topology Control for Wireless Sensor Networks | 2015 |
| 39 | Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks | 2015 |
| 40 | An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks | 2015 |
| 41 | Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network With Isolated Nodes | 2015 |
| 42 | Lightweight Self-Adapting Linear Prediction Algorithms for Wireless Sensor Networks | 2015 |
| 43 | Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources | 2015 |
| 44 | A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks | 2015 |
| 45 | ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs | 2015 |
| 46 | Energy-Efficient Scheduling in Green Vehicular Infrastructure With Multiple Roadside Units | 2015 |
| 47 | Delay-Constrained Data Aggregation in VANETs | 2015 |
| 48 | An Evolutionary Game Theory-Based Approach to Cooperation in VANETs Under Different Network Conditions | 2015 |
| 49 | Speed Adaptive Probabilistic Flooding for Vehicular Ad Hoc Networks | 2015 |
| 50 | A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks | 2015 |
| 51 | A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks | 2015 |
| 52 | Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding | 2015 |
| 53 | Optimal Configuration of Network Coding in Ad Hoc Networks | 2015 |
| 54 | Packet Delivery Ratio/Cost in MANETs with Erasure Coding and Packet Replication | 2015 |
| 55 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | 2015 |
| 56 | Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach | 2015 |
| 57 | Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems | 2015 |
| 58 | User Privacy and Data Trustworthiness in Mobile Crowd Sensing | 2015 |
| 59 | A Virtual Coordinate-Based Bypassing Void Routing for WSN | 2015 |
| 60 | Adaptive Routing for Dynamic On-Body WSN | 2015 |
| 61 | An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile WSN | 2015 |
| 62 | Cost-Aware SEcure Routing (CASER) Protocol Design for WSN | 2015 |
| 63 | Efficient Coverage and Connectivity Preservation With Load Balance for WSN | 2015 |
| 64 | Geographic Routing in Clustered WSN Among Obstacles | 2015 |
| 65 | Impact of Limiting Hop Count on the Lifetime of WSN | 2015 |
| 66 | Joint Virtual MIMO and Data Gathering for WSN | 2015 |
| 67 | Time-Sensitive Utility-Based Single-Copy Routing in Low Duty Cycle WSN | 2015 |
| 68 | BUS-VANET: A BUS Vehicular Network Integrated with Traffic Infrastructure | 2015 |
| 69 | Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System | 2015 |
| 70 | VANET Modeling and Clustering Design Under Practical Traffic, Channel and Mobility Conditions | 2015 |
| 71 | Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis | 2015 |
| 72 | VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based WSN | 2015 |
| 73 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | 2015 |
| 74 | An Efficient Distributed Trust Model for Wireless Sensor Networks | 2015 |
| 75 | An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks | 2015 |
| 76 | Effective Key Management in Dynamic Wireless Sensor Networks | 2015 |
| 77 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | 2015 |
| 78 | Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs | 2015 |
| 79 | Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter | 2015 |
| 80 | Time-Delayed Broadcasting for Defeating Inside Jammers | 2015 |
| 81 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | 2015 |
