Welcome to Latest NS2 Projects Section, Here We have developed the Latest 2016 journal Papers on different domains like networking, network security, Wireless Sensor Networks, Wireless Ad Hoc Networks, MANET, etc. Even you can find the best 2015, 2014 NS2 Titles below:
2016 Journal Papers
- Mitigating the dropping attacks by support of node privacy in wireless ad hoc networks
- Discriminate the collusion attacks by suing data aggregation in wireless sensor networks
- To mitigate the trust fluctuations in unattended wireless sensor networks by support of trust management
- Discriminating the attacks by using data aggregation technique secure way in wireless sensor networks
- Efficient data access in delay tolerant networks by support of cache secure data
- Secure data discovery in wireless sensor networks with efficiency
- Improve the performance of cluster based networks for secure data transmission
- Secure routing in delay tolerant networks by using dynamic trust management system
- Efficient data access in wireless sensor network by using trust with authority
- Host based intrusion detection system and cooperative mechanism for mitigating the accuracy in virtual network systems
- Mitigate the energy consumption in dynamic wireless sensor networks using mathematical model
- Performance of network lifetime using energy balanced routing method in WSN
- Improve the performance of network based on packet generation
- Improve the lifetime of network by the affect of mitigating the hop count
2015 Journal Papers
- Privacy preserving and truthful detection of packet ropping attacks in wireless ad hoc networks
- A secure distributed data discovery and dissemination in wsns
- Secure and efficient data transmission for cluster based wireless networks
- An efficient distributed trust model for wsns
- Effective key management in dynamic wireless sensor networks
- Impact of limiting hop count on the lifetime of wireless sensor networks
- Defending against collaborative attacks by malicious nodes in manets: a cooperative bait detection approach
- Design and simulation of enhanced MODLEACH for wsn
- An algorithm to detect malicious nodes in wireless sensor network using Enhanced MODLEACH
- An enhanced cluster-head selection scheme for distributed heterogeneous wireless sensor network
2014 Journal Papers
- Secure data aggregation technique for wireless sensor network in the presence of collusion attacks
- Secure data aggregation in wireless sensor networks: filtering out the attackers impact
- Cooperative caching for efficient data access in disruption tolerant networks
- Dynamic trust management for delay tolerant networks and its application to secure routing
- An energy balanced routing method based on forward-aware factor for wsns
- Automatic test packet generation
- Randomized multipath routing in wsns
- Using identity and trust based management for MANET