Vous êtes sur la page 1sur 34

M.

E Computer Science Networking Projects

Web : www.kasanpro.com

Email : sales@kasanpro.com

List Link : http://kasanpro.com/projects-list/m-e-computer-science-networking-projects

Title :On Burst Transmission Scheduling in Mobile TV Broadcast Networks


Language : NS2
Project Link : http://kasanpro.com/p/ns2/transmission-scheduling-mobile-tv-broadcast-networks
Abstract : In mobile TV broadcast networks, the base station broadcasts TV channels in bursts such that mobile
devices can re- ceive a burst of traffic and then turn off their radio frequency cir- cuits till the next burst in order to
save energy. To achieve this en- ergy saving without scarifying streaming quality, the base station must carefully
construct the burst schedule for all TV channels. This is called the burst scheduling problem. In this paper, we prove
that the burst scheduling problem for TV channels with arbitrary bit rates is NP-complete. We then propose a practical
simplification of the general problem, which allows TV channels to be classified into multiple classes, and the bit rates
of the classes have power of two increments, e.g., 100, 200, and 400 kbps. Using this practical simplification, we
propose an optimal and efficient burst sched- uling algorithm. We present theoretical analysis, simulation, and actual
implementation in a mobile TV testbed to demonstrate the optimality, practicality, and efficiency of the proposed
algorithm.
Title :Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/analysis-shortest-path-routing-large-multi-hop-wireless-networks
Abstract : In this paper, we analyze the impact of straight line routing in large homogeneous multi-hop wireless
networks. We estimate the nodal load, which is defined as the number of packets served at a node, induced by
straight line routing. For a given total offered load on the network, our analysis shows that the nodal load at each node
is a function of the node's Voronoi cell, the node's location in the network, and the traffic pattern specified by the
source and destination randomness and straight line routing. In the asymptotic regime, we show that each node's
probability that the node serves a packet arriving to the network approaches the products of half the length of the
Voronoi cell perimeter and the load density function that a packet goes through the node's location. The density
function depends on the traffic pattern generated by straight line routing, and determines where the hot spot is
created in the network. Hence, contrary to conventional wisdom, straight line routing can balance the load over the
network, depending on the traffic patterns.
Title :Multicast Multi-Path Power Efficient Routing In Mobile Adhoc Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/multicast-multi-path-power-efficient-routing-in-mobile-adhoc-networks
Abstract : The proposal of this paper presents a measurement-based routing algorithm to load balance intra domain
traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer
overlaying. The proposed algorithm is able to converge under different network models, where each model reflects a
different set of assumptions about the multicasting capabilities of the network. The algorithm is derived from
simultaneous perturbation stochastic approximation and relies only on noisy estimates from measurements.
Simulation results are presented to demonstrate the additional benefits obtained by incrementally increasing the
multicasting capabilities. The main application of mobile ad hoc network is in emergency rescue operations and
battlefields. This paper addresses the problem of power awareness routing to increase lifetime of overall network.
Since nodes in mobile ad hoc network can move randomly, the topology may change arbitrarily and frequently at
unpredictable times. Transmission and reception parameters may also impact the topology. Therefore it is very
difficult to find and maintain an optimal power aware route. In this work a scheme has been proposed to maximize the
network lifetime and minimizes the power consumption during the source to destination route establishment. The
proposed work is aimed to provide efficient power aware routing considering real and non real time data transfer.
Title :Fast Algorithms for Resource Allocation in Wireless Cellular Networks

Language : NS2
Project Link : http://kasanpro.com/p/ns2/resource-allocation-algorithm-wireless-cellular-networks
Abstract : We consider a scheduled orthogonal frequency division multiplexed (OFDM) wireless cellular network
where the channels from the base-station to the mobile users undergo flat fading. Spectral resources are to be
divided among the users in order to maximize total user utility. We show that this problem can be cast as a nonlinear
convex optimization problem, and describe an ( ) algorithm to solve it. Computational experiments show that the
algorithm typically converges in around 25 iterations, where each iteration has a cost that is ( ), with a modest
constant. When the algorithm starts from an initial resource allocation that is close to optimal, convergence typically
takes even fewer iterations. Thus, the algorithm can efficiently track the optimal resource allocation as the channel
conditions change due to fading. We also show how our techniques can be extended to solve resource allocation
problems that arise in wideband networks with frequency selective fading and when the utility of a user is also a
function of the resource allocations in the past.
Title :Minimizing Delay and Maximizing Lifetime for WSN in anycast
Language : NS2
Project Link : http://kasanpro.com/p/ns2/minimizing-delay-maximizing-lifetime-wsn
Abstract : In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven
wireless sensor networks, for which events occur infrequently. In such systems, most of the energy is consumed
when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to prolong
the lifetime of these energy-constrained wireless sensor networks. However, sleep-wake scheduling could result in
substantial delays because a transmitting node needs to wait for its next-hop relay node to wake up. An interesting
line of work attempts to reduce these delays by developing "anycast"-based packet forwarding schemes, where each
node opportunistically forwards a packet to the first eighboring node that wakes up among multiple candidate nodes.
In this paper, we first study how to optimize the anycast forwarding schemes for minimizing the expected
packet-delivery delays from the sensor nodes to the sink. Based on this result, we then provide a solution to the joint
control problem of how to optimally control the system parameters of the sleep-wake scheduling protocol and the
anycast packet-forwarding protocol to maximize the network lifetime, subject to a constraint on the expected
end-to-end packet-delivery delay. Our numerical results indicate that the proposed solution can outperform prior
heuristic solutions in the literature, especially under the practical scenarios where there are obstructions, e.g., a lake
or a mountain, in the coverage area of wireless sensor networks.
M.E Computer Science Networking Projects
Title :Measuring Capacity Bandwidth of Targeted Path Segments
Language : NS2
Project Link : http://kasanpro.com/p/ns2/measuring-capacity-bandwidth-targeted-path-segments
Abstract : Accurate measurement of network bandwidth is important for network management applications as well as
flexible Internet applications and protocols which actively manage and dynamically adapt to changing utilization of
network resources. Extensive work has focused on two approaches to measuring bandwidth: measuring it
hop-by-hop, and measuring it end-to-end along a path. Unfortunately, best-practice techniques for the former are
inefficient and techniques for the latter are only able to observe bottlenecks visible at end-to-end scope. In this
paper,we develop end-to-end probing methods which can measure bottleneck capacity bandwidth along arbitrary,
targeted subpaths of a path in the network, including subpaths shared by a set of flows. We evaluate our technique
through ns simulations, then provide a comparative Internet performance evaluation against hop-by-hop and
end-to-end techniques. We also describe a number of applications which we foresee as standing to benefit from
solutions to this problem, ranging from network troubleshooting and capacity provisioning to optimizing the layout of
application-level overlay networks, to optimized replica placement.
Title :Resource Allocation for Multicast Services in Multicarrier Wireless Communications
Language : NS2
Project Link : http://kasanpro.com/p/ns2/resource-allocation-multicast-services-multicarrier-wireless-communications
Abstract : We consider a multicast resource allocation problem for the downlink in OFDM-based wireless cellular
network systems. In a conventional multicast system, to accommodate users with bad channel conditions, the
transmission is based on the worst case user. We show that such a multicast system saturates the capacity when the
number of users increases in fading environments. We exploit the multicarrier nature of OFDM and advances in

coding techniques such as MDC (multiple description coding), in which arbitrary combinations of layers can be
decoded at the receiver. Different MDC layers are carried over different subcarriers and users with good channels
receive data from more subcarriers than users with poor channel conditions. We present an optimal subcarrier/bit
allocation method requiring full search of possible candidates. To reduce the complexity, we propose a two-step
suboptimum algorithm by separating subcarrier allocation and bit loading. Numerical results show that the proposed
heuristics significantly outperform the conventional multicast transmission scheme. The difference between optimum
and heuristic solutions is less than 5%.
Title :Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/rate-allocation-network-lifetime-problem-wireless-sensor-networks
Abstract : An important performance consideration for wire- less sensor networks is the amount of information
collected by all the nodes in the network over the course of network lifetime. Since the objective of maximizing the
sum of rates of all the nodes in the network can lead to a severe bias in rate allocation among the nodes, we
advocate the use of lexicographical max- min (LMM) rate allocation. To calculate the LMM rate allocation vector, we
develop a polynomial-time algorithm by exploiting the parametric analysis (PA) technique from linear program (LP),
which we call serial LP with Parametric Analysis (SLP-PA). We show that the SLP-PA can be also employed to
address the LMM node lifetime problem much more efficiently than a state-of-the- art algorithm proposed in the
literature. More important, we show that there exists an elegant duality relationship between the LMM rate allocation
problem and the LMM node lifetime problem. Therefore, it is sufficient to solve only one of the two problems.
Important insights can be obtained by inferring duality results for the other problem.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Energy Based Clustering Self Organizing Map Protocol For extending Wireless Sensor Networks lifetime and
coverage
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/energy-based-clustering-self-organizing-map-protocol-for-wireless-sensor-networks
Abstract : Today, Cluster based routing protocols are well known schemes for extending Wireless Sensor Networks
lifetime. However, there are several energy efficient cluster-based protocols in the literature; most of them use the
topological neighborhood or adjacency as main parameter to form the clusters. This paper presents a new centralized
adaptive Energy Based Clustering protocol through the application of Self organizing map neural networks (called
EBC-S) which can cluster sensor nodes, based on multi parameters; energy level and coordinates of sensor nodes.
We applied some maximum energy nodes as weights of SOM map units; so that the nodes with higher energy attract
the nearest nodes with lower energy levels. Therefore, formed clusters may not necessarily contain adjacent nodes.
The new algorithm enables us to form energy balanced clusters and equally distribute energy consumption.
Simulation results and comparison with previous protocols( LEACH and LEA2C) prove that our new algorithm is able
to extend the lifetime of the network, while it can insure more network coverage in it's lifetime through distributed
death of nodes in network space.
Title :Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period
Language : NS2
Project Link : http://kasanpro.com/p/ns2/energy-maps-mobile-wireless-networks-coherence-time-spreading-period
Abstract : We show that even though mobile networks are highly unpredictable when viewed at the individual node
scale, the end-to-end quality-of-service (QoS) metrics can be stationary when the mobile network is viewed in the
aggregate. We define the coherence time as the maximum duration for which the end-to-end QoS metric remains
roughly constant, and the spreading period as the minimum duration required to spread QoS information to all the
nodes. We show that if the coherence time is greater than the spreading period, the end-to-end QoS metric can be
tracked. We focus on the energy consumption as the end-to-end QoS metric, and describe a novel method by which
an energy map can be constructed and refined in the joint memory of the mobile nodes. Finally, we show how energy
maps can be utilized by an application that aims to minimize a node's total energy consumption over its near-future
trajectory.
M.E Computer Science Networking Projects

Title :An Optimization-based Approach for Connecting Partitioned Mobile Sensor/Actuator Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/connecting-partitioned-mobile-sensor-actuator-networks
Abstract : Wireless Sensor and Actuator Networks (WSANs) employ mobile nodes in addition to stationary tiny
sensors. Similarly, mobile sensors make it possible to have the flexibility of mobility in mobile sensor network (MSN)
applications. Mobility can be exploited to connect partitioned WSANs and MSNs due to large scale damages or
deployment problems. However, since mobility consume significant energy and it can be limited due to terrain
constraints, the travel distance for the mobile nodes should be minimized in such a recovery effort. In this paper, we
present a mathematical model which minimizes the total travel distance for connecting a given number of partitions.
The idea is based on network flows and the problem is modeled as a mixed integer nonlinear program. The nonlinear
terms in the model are linearized using a polygon approximation for computational efficiency. We evaluated the
performance of the proposed approach in terms of total distance as well as the time to reconnect the partitions. The
results show that our approach outperforms the heuristic approach in terms of total distance and delay and reveals
various trade-offs involved in connecting multiple partitions.
Title :Optimal replicator factor control in wireless sensor networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/optimal-replicator-factor-control-wireless-sensor-networks
Abstract : For TDMA MAC protocols in wireless sensor networks (WSNs), redundancy and retransmission are two
important methods to provide high end-to-end transmission reliability. Since reliable transmissions will lead to more
en- ergy consumption, there exists an intrinsic tradeoff between transmission reliability and energy efficiency. For
each link, we name the number of its reserved time slots in each MAC superframe as a replicator factor. In the
following paper, we propose a reliability-lifetime tradeoff framework (RLTF) for WSNs to study replicator factor control
problem. First, for the redundancy TDMA MAC, we formulate replicator factor control problem as convex
programming. By the gradient pro- jection method, we develop a fully distributed algorithm to solve the convex
programming. Second, for the retransmission TDMA MAC, we set the retransmission upper bound for each link
according to the optimal replicator factors under the redundancy MAC and compute the total communication overhead
for the retransmission MAC. Finally, we compare the communication overhead of these two MAC protocols under
different channel conditions.
Title :Survey of Fault Recovery in Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/fault-recovery-wireless-sensor-networks
Abstract : In the past few years wireless sensor networks have received a greater interest in application such as
disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are
expected to operate autonomously in unattended environments and potentially in large numbers. Failures are
inevitable in wireless sensor networks due to inhospitable environment and unattended deployment. The data
communication and various network operations cause energy depletion in sensor nodes and therefore, it is common
for sensor nodes to exhaust its energy completely and stop operating. This may cause connectivity and data loss.
Therefore, it is necessary that network failures are detected in advance and appropriate measures are taken to
sustain network operation. In this paper we survey cellular architecture and cluster-based to sustain network
operation in the event of failure cause of energy-drained nodes. The failure detection and recovery technique
recovers the cluster structure in less than one-fourth of the time taken by the Gupta algorithm and is also proven to be
70% more energy-efficient than the same. The cluster-based failure detection and recovery scheme proves to be an
efficient and quick solution to robust and scalable sensor network for long and sustained operation. In cellular
architecture the network is partitioned into a virtual grid of cells to perform fault detection and recovery locally with
minimum energy consumption. Fault detection and recovery in a distributed manner allows the failure report to be
forwarded across cells. Also this algorithm has been compared with some existing related work and proven to be
more energy efficient.
Title :Security Solution by Detecting Fraudulent Usage In Wireless Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/detecting-fraudulent-usage-in-wireless-networks
Abstract : Security research in to wired networks indicates that there are always some weak points in the systems
that are hard to predict. This is particularly true for a wireless network, in which open wireless transmission media and
low physical-security protection of mobile devices pose additional challenges for prevention-based approaches and

detection-based approaches. Sensor network security mechanisms can be divided into two categories:
communication protocols and key management architectures. Communication protocols deal with the cryptographic
algorithms used to achieve availability, confidentiality, integrity, and authentication. Key management architectures
handle the complexities of creating and distributing keys used by communication protocols. In this we explore
Taxonomy of security solutions, Taxonomy of key distributing schemes, Detecting Computer and Network Misuse,
Monitoring misuse through expert systems, Anomaly-based Intrusion Detection Using Mobility Profiles of Public
Transportation Users, How to Increase Security in Mobile Networks by Anomaly Detection, The Baye's Decision Rule.
Title :Framework for Fault Revoking and Homogeneous Distribution of Randomly Deployed Sensor Nodes in
Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/fault-revoking-homogeneous-distribution-randomly-deployed-sensor-nodes
Abstract : Wireless sensor networks (WSNs) are one of the most exciting and challenging research areas. Sensor
nodes (SNs) are generally deployed randomly from some flying base station (BS) in the deployment area, which may
result uneven distribution of these static SNs. Besides these, they may be damaged because of natural calamities. In
order to obtain the homogeneous distribution it is necessary to provide external kinetic to these static SNs until they
acquire the appropriate position in the deployment area.
In this paper, we propose a framework for fault revoking and homogeneous distribution of randomly deployed SNs in
the deployment area, so that the sink node within various clusters consumes equal amount of energy. The external
kinetic to these static SNs for their homogeneous distribution is provided by the MSNs which are rich in energy.
However, if any node gets damaged due to some environmental activity, then the framework makes provision for fault
revoking with the help of Fault Revoking Mobile Sensor Node (FRN) in the deployment area. Keywords: Sensor Node
(SN), Base Station (BS), Mobile Sensor Node (MSN), Fault Revoking Mobile Sensor Node (FRN), Location ID (LID).
M.E Computer Science Networking Projects
Title :A Motivation for Context-Aware Scheduling in Wireless Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/context-aware-scheduling-wireless-networks
Abstract : Mobile phones offer a large range of different communicating applications, e.g. pure voice services, web
surfing, video downloads. Most of this traffic does not have real-time delay requirements. By serving all flows under
equal delay constraints, transmission resources are used very inefficiently. In this paper, we propose a scheduling
framework which allows balancing the diverse application requirements by exploitation of the current users' context.
First results demonstrate the feasibility and flexibility of our approach.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Performance Optimization For Multimedia Transmission In Wireless Home Network
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/performance-optimization-for-multimedia-transmission-in-wireless-home-network
Abstract : This paper describes a network adaptive real-time demonstrator for converged applications (audio, video,
voice, and data) on an IEEE802.11g Wireless Home Network. Video transmission quality is optimised by dynamically
adapting the source video bit rate to a real-time estimate of the available bandwidth on the wireless network and by
introducing data redundancy to recover packet losses (Forward Error Correction). Video adaptation is done by
DCT-domain video transcoding algorithms performed in real-time on a digital signal processor.
Voice over Internet Protocol (VoIP) services are offered manag- ing the coexistence of 802.11g terminals and
Bluetooth headsets. Audio time-scale modification and adaptive playout algorithms enable robust and high quality
interactive voice communications minimizing the effect of packet losses and jitter typical of wireless scenarios. All
devices can share and remotely control content via Universal Plug and Play (UPnP).
Title :Energy Efficient In Ad Hoc Networks
Language : NS2

Project Link : http://kasanpro.com/p/ns2/energy-efficient-in-ad-hoc-networks


Abstract : Wireless Ad Hoc Networks comprise a fast developing research area with a vast spectrum of applications.
Wireless sensor network systems enable the reliable monitoring of a variety of environments for both civil and military
applications. The Energy efficiency continues to be a key factor in limiting the deployability of ad-hoc networks.
Deploying an energy efficient system exploiting the maximum lifetime of the network has remained a great challenge
since years. The time period from the instant at which the network starts functioning to the time instant at which the
first network node runs out of energy, i.e. the network lifetime is largely dependent on the system energy efficiency. In
this paper, we look at energy efficient protocols, which can have significant impact on the lifetime of these networks.
The cluster heads get drain out maximum energy in the wireless ad hoc networks. We propose an algorithm that
deals with minimizing the rate of dissipation of energy of cluster heads. The algorithm LEAD deals with energy
efficient round scheduling of cluster head allocation of nodes and then followed by allocation of nodes to the cluster
heads maximizing network lifetime using ANDA [1, 2]. We compare our results with the previous works.
Title :The Beacon Movement Detection Problem in Wireless Sensor Networks for Localization Applications
Language : NS2
Project Link : http://kasanpro.com/p/ns2/beacon-movement-detection-wireless-sensor-networks
Abstract : Localization is a critical issue in wireless sensor networks. In most localization systems, beacons are being
placed as references to determine the positions of objects or events appearing in the sensing field. The underlying
assumption is that beacons are always reliable. In this work, we define a new Beacon Movement Detection (BMD)
problem. Assuming that there are unnoticed changes of locations of some beacons in the system, this problem
concerns how to automatically monitor such situations and identify such unreliable beacons based on the mutual
observations among beacons only. Existence of such unreliable beacons may affect the localization accuracy. After
identifying such beacons, we can remove them from the localization engine. Four BMD schemes are proposed to
solve the BMD problem. Then, we evaluate how these solutions can improve the accuracy of localization systems in
case there are unnoticed movements of some beacons. Simulation results show that our solutions can capture most
of the unnoticed beacon movement events and thus can significantly alleviate the degradation of such events.
Title :Enhanced Chain Based Data Collection Sensor Network Technique
Language : NS2
Project Link : http://kasanpro.com/p/ns2/chain-based-data-collection-sensor-network-technique
Abstract : Wireless sensor networks (WSNs) have received tremendous attention in recent years because of the
development of sensor devices, as well as wireless communication technologies. WSNs make it easier to monitor and
control physical environments from remote locations and present many significant advantages over wired sensor
networks for a variety of civilian and military applications [1,2] .A WSN is usually randomly deployed in inaccessible
terrains, disaster areas, or polluted environments, where battery replacement or recharge is difficult or even
impossible to be performed. For this reason, network lifetime is of crucial importance to a WSN. To prolong network
lifetime, efficient utilization of energy is considered with highest priority. In this paper, we propose an Enhanced chain
based data collection sensor network, which ensures maximum utilization of network energy .Also, enhances the
reliability of the network. This method gives a good compromise between energy efficiency and latency.
M.E Computer Science Networking Projects
Title :Intelligent Clustering for Balanced Energy Consumption in Wireless Sensor Networks
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/intelligent-clustering-balanced-energy-consumption-wireless-sensor-networks
Abstract : In this paper, we present a new intelligent clustering protocol based on self -Organizing Map neural
network in order to balance the energy consumption in Wireless Sensor Networks. The clustering would be done
based on two important criteria, energy level and coordinates of sensor nodes. Energy based clustering can cause
more balanced energy consumption compared to topologic clustering alone, through creating clusters with equal
energy levels. As a result, this new clustering design can prevent from early death of the nodes and allow for random
death of them. Moreover, a new cost function has been presented to decide about selecting an appropriate cluster
head for each formed cluster based on multiple criteria in which the weights of these criteria are determined through
an AHP method. Simulation results proved better performance of proposed clustering design and cluster head cost
function in extending network lifetime compared to two previous protocols.

Title :Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/network-fault-correction-externally-managed-overlay-networks
Abstract : We consider an end-to-end approach of inferring probabilistic data-forwarding failures in an externally
managed overlay network, where overlay nodes are independently operated by various administrative domains. Our
optimization goal is to minimize the expected cost of correcting (i.e., diagnosing and repairing) all faulty overlay nodes
that cannot properly deliver data. Instead of first checking the most likely faulty nodes as in conventional fault
localization problems, we prove that an optimal strategy should start with checking one of the candidate nodes, which
are identified based on a potential function that we develop. We propose several efficient heuristics for inferring the
best node to be checked in large-scale networks. By extensive simulation, we show that we can infer the best node in
at least 95% of time, and that first checking the candidate nodes rather than the most likely faulty nodes can decrease
the checking cost of correcting all faulty nodes
Title :A Sensor Relocation Scheme for Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/sensor-relocation-scheme-wireless-sensor-networks
Abstract : In the past few years wireless sensor networks have received a greater interest in application such as
disaster management, border protection, combat field reconnaissance and security surveillance. Sensor nodes are
expected to operate autonomously in unattended environments and potentially in large numbers. WSNs cannot be
deployed manually in a hostile or harsh environment. Thus, WSNs can be formed by dropping them from the air.
However, random deployment of sensor nodes can leave holes in terms of coverage in the sensing area. Moreover,
sensor nodes failure may cause connectivity loss and in some cases network partitioning. The mobile devices can be
used as an orthogonal method to address the network connectivity, coverage, and network life time problems in
WSNs. Mobile sensors are useful as they can move to locations that meet sensing coverage requirements. In this
paper we propose a novel sensor relocation scheme where redundant mobile nodes are moved to heal coverage
holes in the network. We evaluate this work by simulations and show that our approach outperforms others in terms of
relocation time and total energy consumption.
Title :A Distributed Data Collection Algorithm for Wireless Sensor Networks with Persistent Storage Nodes
Language : NS2
Project Link : http://kasanpro.com/p/ns2/distributed-data-collection-algorithm-wireless-sensor-networks
Abstract : A distributed data collection algorithm to accurately store and forward information obtained by wireless
sensor networks is proposed. The proposed algorithm does not depend on the sensor network topology, routing
tables, or geographic locations of sensor nodes, but rather makes use of uniformly distributed storage nodes.
Analytical and simulation results for this algorithm show that, with high probability, the data disseminated by the
sensor nodes can be precisely collected by querying any small set of storage nodes.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Extending k-Coverage Lifetime of Wireless Sensor Networks with Surplus Nodes
Language : NS2
Project Link : http://kasanpro.com/p/ns2/extending-coverage-lifetime-wireless-sensor-networks-surplus-nodes
Abstract : In the wireless sensor network (WSN) for periodically sensing and gathering environmental information
uniformly in a vast sensing field, reducing the system operating cost taking into account sensor node installation and
WSN lifetime is essential. In this paper, we propose a method to prolong the life time of such a data gathering WSN,
by randomly scattering "surplus" sensor nodes over the target field. In our method,we assume that each sensor node
has three operation modes: sensing, relaying, and sleeping. Each sensing node senses environmental data and
sends/relays the data to the sink node via multi-hop wireless communication. Each relaying node just forwards the
data received from its uplink node to its down- link nodes. Each sleeping node does nothing and keeps its battery. We
propose an algorithm that dynamically changes mode of each sensor node so that the WSN lifetime becomes as long
as possible by switching the least number of nodes for achieving k-coverage of the field to sensing mode. Through
computer simulations, we confirmed that our method can prolong the WSN lifetime almost proportionally to the
number of deployed sensor nodes.

M.E Computer Science Networking Projects


Title :Throughput Optimization in Multihop Wireless Networks with Multipacket Reception and Directional Antennas
Language : NS2
Project Link : http://kasanpro.com/p/ns2/throughput-optimization-multihop-wireless-networks
Abstract : Recent advances in the physical layer have enabled the simultaneous reception of multiple packets by a
node in wireless networks. We address the throughput optimization problem in wireless networks that support
multipacket reception (MPR) capability. The problem is modeled as a joint routing and scheduling problem, which is
known to be NP-hard. The scheduling subproblem deals with finding the optimal schedulable sets, which are defined
as subsets of links that can be scheduled or activated simultaneously. We demonstrate that any solution of the
scheduling subproblem can be built with jEj 1 or fewer schedulable sets, where jEj is the number of links of the
network. This result is in contrast with previous works that stated that a solution of the scheduling subproblem is
composed of an exponential number of schedulable sets. Due to the hardness of the problem, we propose a
polynomial time scheme based on a combination of linear programming and approximation algorithm paradigms. We
illustrate the use of the scheme to study the impact of design parameters on the performance of MPR-capable
networks, including the number of transmit interfaces, the beamwidth, and the receiver range of the antennas.
Title :Rate Optimization Scheme for Node Level Congestion in Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/rate-optimization-scheme-node-level-congestion-wireless-sensor-networks
Abstract : The Application specific wireless sensor network differs basically from the general data network. It focuses
on tight communication but restricted in storage, lifetime, power and energy. The WSNs consists of unbelievable
network load and it leads to energy wastage and packet loss. Many of the existing concepts are developed for link
level congestion control. The Rate optimization technique for node level congestion will assist to control the traffic at
node level. Except source and sink node the remaining nodes may participate in forwarding the packets towards the
communication direction. The rate based adjustment technique is applied to avoid packet dropping in order to save
the network resources. We are proposing this scheme to avoid the buffer overflow and it is not taking too much
energy consumption in the communication. This scheme will assist to improve the throughput, efficiency and resource
saving. Node level congestion control is effectively needed for WSN, because the node deployment can be anywhere.
We are Introducing this scheme using the network simulators extended tool called mannasim.
Title :Multi-Hop Auction-Based Bandwidth Allocation in Wireless Ad Hoc Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/multi-hop-auction-based-bandwidth-allocation-wireless-ad-hoc-networks
Abstract : In a wireless ad hoc network, multiple end-to-end flows that traverse through the same wireless
communication range compete for the shared wireless bandwidth. Then, how to allocate those shared bandwidth
among flows is one of most critical issues for the system performance. To that end, this paper proposes an
auction-based bandwidth allocation with multi-hop flow coordination mechanism to enhance various performance
measures. Experimental results suggest that the proposed approach outperforms other approaches in terms of
network throughput, bandwidth utilization, fairness, end-to- end delay, and packet loss rate.
Title :Handling Network Uncertainty in Heterogeneous Wireless Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/handling-network-uncertainty-heterogeneous-wireless-networks
Abstract : In a wireless ad hoc network, multiple end-to-end flows that traverse through the same wireless
communication range compete for the shared wireless bandwidth. Then, how to allocate those shared bandwidth
among flows is one of most critical issues for the system performance. To that end, this paper proposes an
auction-based bandwidth allocation with multi-hop flow coordination mechanism to enhance various performance
measures. Experimental results suggest that the proposed approach outperforms other approaches in terms of
network throughput, bandwidth utilization, fairness, end-to- end delay, and packet loss rate.
Title :Electromagnetic Tracking of Transceiver-free Targets in Wireless Networked Environments
Language : NS2
Project Link :

http://kasanpro.com/p/ns2/electromagnetic-tracking-transceiver-free-targets-wireless-networked-environments
Abstract : In this work, the exploitation of wireless systems for non-cooperative target localization and tracking is
investigated. The information about wireless links quality is available on most of commercially available network
devices and represents the input of the proposed methodology. A real-time probability of presence is generated by
means of a learning by example strategy that estimates the unknown relation between the input data and the target
position inside the monitored domain. The real-time capabilities of the proposed approach have been experimentally
verified when dealing with heterogeneous target movements in standard indoor areas.
M.E Computer Science Networking Projects
Title :Adaptive Bloom Filters for Multicast Addressing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/adaptive-bloom-filters-multicast-addressing
Abstract : In-packet Bloom filters are recently proposed as a possible building block of future Internet architectures
replacing IP or MPLS addressing that solves efficient multicast routing, security and other functions in a stateless
manner. In such frameworks a bloom filter is placed in the header which stores the addresses of the destination
nodes or the traversed links. In contrast to the standard Bloom filter, the length of the in-packet Bloom filter must be
highly adaptive to the number of stored elements to achieve low communication overhead. In this paper we propose a
novel type of Bloom filter called Adaptive Bloom filter, which can adapt its length to the number of elements to be
represented with a very fine granularity. The novel filter can significantly reduce the header size for in-packet bloom
filter architecture, by eliminating the wasting effect experienced in existing "block-based" approaches which rely on
concatenating several standard Bloom filters. Nevertheless, it requires slightly more calculations when adding and
removing elements.
Title :Minimum Delay and Energy Efficient TDMA Scheduling for Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/minimum-delay-energy-efficient-tdma-scheduling-wireless-sensor-networks
Abstract : This paper studies time division multiple access (TDMA) scheduling with both energy efficiency and
optimized delayin clustered wireless sensor networks (WSNs). To achieve this goal,we first build a cross-layer
optimization model for attaining networkwide efficient energy consumption. We solve this model bytransforming it into
simpler sub-problems that can be solved using conventional methods. We then propose a TDMA schedulingalgorithm
based on the input derived from the cross-layeroptimization model. The proposed algorithm utilizes the slot
reuseconcept, which significantly reduces the end-to-end latency in WSNs,while retaining the feature ofenergy
efficiency. In addition, theproposed solution in this paper is applied to clustered WSNs. Thisfeature facilitates the
application of our approach in large size WSNs.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Power Harvesting for Smart Sensor Networks in Monitoring Water Distribution System
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/power-harvesting-smart-sensor-networks-monitoring-water-distribution-system
Abstract : Recently, there has been a growing interest in using wireless sensor networks for monitoring water
distribution infrastructure to help drinking water utilities to have better understanding of hydraulic and water quality
statement of their underground assets. One of the challenges is limited power resources for operating the smart
sensors and sensor networks. Current common used power supplies for sensor node are batteries. Batteries have
many drawbacks such as short life time and need to be replaced on regular basis which is uneconomical and
unmanageable in hard access environment such as buried underground water pipelines. Energy harvesting of
ambient energy in the water pipeline and powering wireless sensor node including sensing, processing, and
communications would be particularly attractive option because the life time of the node will be potentially infinite for
supporting wireless sensor networks. The paper will review and discuss the potential of using power harvesting
techniques for monitoring water distribution networks and the work done in the area of monitoring water distribution
systems using smart sensor networks.

Title :A Localized Algorithm for Restoring Internode Connectivity in Networks of Moveable Sensors
Language : NS2
Project Link : http://kasanpro.com/p/ns2/algorithm-restoring-internode-connectivity-networks-moveable-sensors
Abstract : Recent years have witnessed a growing interest in the applications of wireless sensor networks (WSNs).
In some of these applications, such as search and rescue and battlefield reconnaissance, a set of mobile nodes is
deployed in order to collectively survey an area of interest and/or perform specific surveillance tasks. Such
collaboration among the sensors requires internode interaction and thus maintaining network connectivity is critical to
the effectiveness of WSNs. While connectivity can be provisioned at startup time and then sustained through careful
coordination when nodes move, a sudden failure of a node poses a challenge since the network may get partitioned.
This paper presents RIM; a distributed algorithm for Recovery through Inward Motion. RIM strives to efficiently restore
the network connectivity after a node failure. Instead of performing a networkwide analysis to assess the impact of the
node failure and orchestrate a course of action, RIM triggers a local recovery process by relocating the neighbors of
the lost node. In addition to minimizing the messaging overhead, RIM opts to reduce the distance that the individual
nodes have to travel during the recovery. The correctness of the RIM algorithm is proven and the incurred overhead is
analyzed. The performance of RIM is validated through simulation experiments.
Title :Efficient Feature Distribution for Object Matching in Visual-Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/efficient-feature-distribution-object-matching-visual-sensor-networks
Abstract : In this paper, we propose a framework of hierar- chical feature distribution for object matching in a network
of visual sensors. In our approach, we hierarchically distribute the information in such a way that each individual node
maintains only a small amount of information about the objects seen by the network. Nevertheless, this amount is
sufficient to efficiently route queries through the network without any degradation of the matching performance. A set
of requirements that have to be fulfilled by the object-matching method to be used in such a framework is defined. We
provide examples of mapping four well-known, object-matching methods to a hierarchical feature- distribution
scheme. The proposed approach was tested on a standard COIL-100 image database and in a basic surveillance
scenario using our own distributed network simulator. The results show that the amount of data transmitted through
the network can be significantly reduced in comparison to naive feature- distribution schemes such as flooding.
M.E Computer Science Networking Projects
Title :Edge Self-Monitoring for Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/edge-self-monitoring-wireless-sensor-networks
Abstract : Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing
schemes assume the existence of sufficient number of active nodes to carry out monitoring operations. Such an
assumption, however, is often difficult for a large-scale sensor network. In this work, we focus on designing an
efficient scheme integrated with good self-monitoring capability as well as providing an infrastructure for various
security protocols using local monitoring. To the best of our knowledge, we are the first to present the formal study on
optimizing network topology for edge self-monitoring in WSNs. We show that the problem is NP-complete even under
the unit disk graph (UDG) model and give the upper bound on the approximation ratio in various graph models. We
provide polynomial-time approximation scheme (PTAS) algorithms for the problem in some specific graphs, for
example, the monitoring-set- bounded graph. We further design two distributed polynomial algorithms with provable
approximation ratio. Through comprehensive simulations, we evaluate the effectiveness of our design.
Title :A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/delay-aware-data-collection-network-structure-wireless-sensor-networks
Abstract : Wireless sensor networks utilize large numbers of wireless sensor nodes to collect information from their
sensing terrain. Wireless sensor nodes are battery-powered devices. En- ergy saving is always crucial to the lifetime
of a wireless sensor network. Recently, many algorithms are proposed to tackle the energy saving problem in wireless
sensor networks. In these algorithms, however, data collection efficiency is usually compro- mised in return for
gaining longer network lifetime. There are strong needs to develop wireless sensor networks algorithms with
optimization priorities biased to aspects besides energy saving. In this paper, a delay-aware data collection network
structure for wireless sensor networks is proposed. The objective of the proposed network structure is to minimize

delays in the data collection processes of wireless sensor networks. Two network formation algorithms are designed
to construct the proposed network structure in a centralized and a decentralized approach. Performances of the
proposed network structure are evaluated using computer simulations. Simulation results show that, when comparing
with other common network structures in wireless sensor networks, the proposed network structure is able to shorten
the delays in the data collection process significantly.
Title :Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis
Testing
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/mobile-replica-sensor-node-attacks-detection-using-sequential-hypothesis-testing
Abstract : Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise
sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node
attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control
over much of the network. Several replica node detection schemes have been proposed in the literature to defend
against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do
not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and
effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our
knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show
analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust
manner at the cost of reasonable overheads.
Title :Robust Energy Management Routing in WSN using Neural Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/robust-energy-management-routing-wsn-neural-networks
Abstract : Wireless Sensor Networks (WSNs) deployment process requires a continuous resource of energy. In this
way, it become more important to monitor continuously the consumption of energy, trace where it is most required
and utilized, and make a policy for uniform energy distribution at each node and energy efficient routing in WSNs. In
this paper, we propose neural network based energy efficient routing path discovery and sensor energy management
in WSNs with the objective of maximizing the network lifetime. Two experiments have been conducted with multi
layered feed forward neural networks. One is used to predict the Most Significant Node in the network and another is
used to determine the Group Head amongst the competitive sensor nodes.
Title :Efficient Energy Modeling in Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/efficient-energy-modeling-wireless-sensor-networks
Abstract : WSN consists of a number of sensor nodes, each node assigned with the task of sending the sensed
information from surroundings to a central base station. In this type of network setup, sensor nodes are generally
energy deficient when compared to the base station which is all powerful. Hence it is essential to look into the pattern
of energy consumption and protocols adopted by various nodes, so as to increase the lifetime of the network. In this
paper, we present a multi-hop ad hoc routing protocol which is all energy aware, hence it reduces the overall energy
consumption in the network, thus increasing the life time of nodes in network. This protocol is an event-driven and
location based and designed by assuming a stationary configuration of nodes. In this setup we assume that the
sensor nodes are distributed uniformly in a rectangular grid, with base station at one of the corners of grid. Then we
give a modeling for energy consumed by each node, assuming that an event happens at one node in the grid. By
taking into consideration, a uniform distribution of events all across the grid, we give a formulation for expected
energy consumed by a node. Based on the formulation, we realized that there was uneven distribution in the pattern
of energy consumed by the nodes that are present at boundaries of the grid, and hence we give a small modification
to the proposed protocol which makes the energy consumption pattern uniform, across all the nodes in network.
M.E Computer Science Networking Projects
Title :Prediction or Not? An Energy-Efficient Framework for Clustering-Based Data Collection in Wireless Sensor
Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/energy-efficient-clustering-based-data-collection-wireless-sensor-networks

Abstract : For many applications in wireless sensor networks (WSNs), users may want to continuously extract data
from the networks for analysis later. However, accurate data extraction is difficult--it is often too costly to obtain all
sensor readings, as well as not necessary in the sense that the readings themselves only represent samples of the
true state of the world. Clustering and prediction techniques, which exploit spatial and temporal correlation among the
sensor data provide opportunities for reducing the energy consumption of continuous sensor data collection.
Integrating clustering and prediction techniques makes it essential to design a new data collection scheme, so as to
achieve network energy efficiency and stability. We propose an energy-efficient framework for clustering-based data
collection in wireless sensor networks by integrating adaptively enabling/disabling prediction scheme. Our framework
is clustering based. A cluster head represents all sensor nodes in the cluster and collects data values from them. To
realize prediction techniques efficiently in WSNs, we present adaptive scheme to control prediction used in our
framework, analyze the performance tradeoff between reducing communication cost and limiting prediction cost, and
design algorithms to exploit the benefit of adaptive scheme to enable/disable prediction operations. Our framework is
general enough to incorporate many advanced features and we show how sleep/awake scheduling can be applied,
which takes our framework approach to designing a practical algorithm for data aggregation: it avoids the need for
rampant node-to-node propagation of aggregates, but rather it uses faster and more efficient cluster-to-cluster
propagation. To the best of our knowledge, this is the first work adaptively enabling/disabling prediction scheme for
clustering-based continuous data collection in sensor networks. Our proposed models, analysis, and framework are
validated via simulation and comparison with competing techniques.
Title :Sensor Scheduling for Energy-Efficient Tracking in Cluttered Environments
Language : NS2
Project Link : http://kasanpro.com/p/ns2/sensor-scheduling-energy-efficient-tracking-cluttered-environments
Abstract : In this paper we study the problem of tracking an object moving randomly through a network of wireless
sensors in the presence of clutter. Our objective is to devise strategies for scheduling the sensors to optimize the
tradeoff between tracking performance and energy consumption. The presence of random interference introduces
uncertainty into the origin of the measurements. Data association techniques are thus required to associate each
measurement with the target or discard it as arising from clutter (False alarms). We cast the scheduling problem as a
Partially Observable Markov Decision Process (POMDP), where the control actions correspond to the set of sensors
to activate at each time step. Exact solutions are generally intractable even for the simplest models due to the
dimensionality of the information and action spaces. Hence, we develop an approximate sensor scheduler that
optimizes a point-based value function over a set of reachable beliefs. Point- based updates are driven by a
non-linear filter that combines the validated measurements through proper association probabilities. Our approach
efficiently combines Probabilistic Data Association techniques for belief update with Point-Based Value Iteration for
designing scheduling policies. The generated scheduling policies, albeit suboptimal, provide good energy-tracking
tradeoffs.
Title :A Successive Clutter-Rejection-Based Approach for Early Detection of Diabetic Retinopathy
Language : NS2
Project Link : http://kasanpro.com/p/ns2/clutter-rejection-based-diabetic-retinopathy-detection
Abstract : The presence of microaneurysms (MAs) is usually an early sign of diabetic retinopathy and their automatic
detection from color retinal images is of clinical interest. In this paper, we present a new approach for automatic MA
detection from digital color fundus images. We formulate MA detection as a problem of target detection from clutter,
where the probability of occurrence of target is considerably smaller compared to the clutter. A succes- sive
rejection-based strategy is proposed to progressively lower the number of clutter responses. The processing stages
are designed to reject specific classes of clutter while passing majority of true MAs, using a set of specialized
features. The true positives that remain after the final rejector are assigned a score which is based on its similarity to
a true MA. Results of extensive evaluation of the proposed approach on three different retinal image datasets are
reported, and used to highlight the promise in the presented strategy.
Title :Valuable Detours Least-Cost Anypath Routing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/valuable-detours-least-cost-anypath-routing
Abstract : In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one
specific neighbor. This observation was previously exploited by opportunistic routing protocols, by using single-path
routing metrics to assign to each node a group of candidate relays for a particular destination.
This project addresses the least-cost any path routing (LCAR) problem: how to assign a set of candidate relays at
each node for a given destination such that the expected cost of forwarding a packet to the destination is minimized.

The key is the following tradeoff: on one hand, increasing the number of candidate relays decreases the forwarding
cost, but on the other, it increases the likelihood of "veering" away from the shortest-path route. Prior proposals based
on single-path routing metrics or geographic coordinates do not explicitly consider this tradeoff, and as a result do not
always make optimal choices.
The LCAR algorithm and its framework are general and can be applied to a variety of networks and cost models. We
show how LCAR can incorporate different aspects of underlying coordination protocols, for example a link-layer
protocol that randomly selects which receiving node will forward a packet, or the possibility that multiple nodes
mistakenly forward a packet. In either case, the LCAR algorithm finds the optimal choice of candidate relays that
takes into account these properties of the link layer.
Finally, we apply LCAR to low-power, low-rate wireless communication and introduce a new wireless link-layer
technique to decrease energy transmission costs in conjunction with any path routing. Simulations show significant
reductions in transmission cost to opportunistic routing using single-path metrics. Furthermore LCAR routes are more
robust and stable than those based on single-path distances, due to the integrative nature of the LCAR's route cost
metric.
Title :Self-Reconfigurable Wireless Mesh Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/self-reconfigurable-wireless-mesh-networks
Abstract : During their lifetime, multi-hop wireless mesh networks (WMNs) experience frequent link failures caused
by channel interference, dynamic obstacles and/or applications' bandwidth demands. These failures cause severe
performance degradation in WMNs or require expensive, manual network management for their real-time recovery.
This paper presents an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN to
autonomously recover from local link failures to preserve network performance. By using channel and radio diversities
in WMNs, ARS generates necessary changes in local radio and channel assignments in order to recover from
failures. Next, based on the thus-generated configuration changes, the system cooperatively reconfigures network
settings among local mesh routers. ARS has been implemented and evaluated extensively on our IEEE 802.11-based
WMN test-bed as well as through ns-2-based simulation. Our evaluation results show that ARS outperforms existing
failure-recovery schemes in improving channel-efficiency by more than 90%and in the ability of meeting the
applications' bandwidth demands by an average of 200%.
M.E Computer Science Networking Projects
Title :Live Streaming with Receiver-based Peer-division Multiplexing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/live-streaming-receiver-based-peer-division-multiplexing
Abstract : A number of commercial peer-to-peer systems for live streaming have been introduced in recent years.
The behavior of these popular systems has been extensively studied in several measurement papers. Due to the
proprietary nature of these commercial systems, however, these studies have to rely on a "black-box" approach,
where packet traces are collected from a single or a limited number of measurement points, to infer various properties
of traffic on the control and data planes.
Although such studies are useful to compare different systems from end-user's perspective, it is difficult to intuitively
understand the observed properties without fully reverse-engineering the underlying systems. In this paper we
describe the network architecture of Zattoo, one of the largest production live streaming providers in Europe at the
time of writing, and present a large-scale measurement study of Zattoo using data collected by the provider. To
highlight, we found that even when the Zattoo system was heavily loaded with as high as 20,000 concurrent users on
a single overlay, the median channel join delay remained less than 2 to 5 seconds, and that, for a majority of users,
the streamed signal lags over-the-air broadcast signal by no more than 3 seconds.
Title :Continuous Neighbor Discovery in Asynchronous Sensor Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/continuous-neighbor-discovery-asynchronous-sensor-networks
Abstract : In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes
because of disruptions in wireless communication, transmission power changes, or loss of synchronization between
neighboring nodes. Hence, even after a sensor is aware of its immediate neighbors, it must continuously maintain its
view, a process we call continuous neighbor discovery. In this work we distinguish between neighbor discovery during

sensor network initialization and continuous neighbor discovery. We focus on the latter and view it as a joint task of all
the nodes in every connected segment. Each sensor employs a simple protocol in a coordinate effort to reduce power
consumption without increasing the time required to detect hidden sensors.
Title :Jamming Aware Traffic Allocation for Multiple Path Routing Using Portfolio Selection
Language : C#

Project Link : http://kasanpro.com/p/c-sharp/jamming-aware-traffic-allocation-multiple-path-routing-using-portfolio-selection-im


Abstract : Multiple-path source routing protocols allow a data source node to distribute the total traffic among
available paths. In this article, we consider the problem of jamming-aware source routing in which the source node
performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic
allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We
show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm
based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the
impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the
achievable throughput using our proposed traffic allocation method in several scenarios.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Reliability in Layered Networks with Random Link Failures
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/reliability-layered-networks-random-link-failures
Abstract : We consider network reliability in layered networks where the lower layer experiences random link failures.
In layered networks, each failure at the lower layer may lead to multiple failures at the upper layer. We generalize the
classical polynomial expression for network reliability to the multi-layer setting. Using random sampling techniques,
we develop polynomial time approximation algorithms for the failure polynomial. Our approach gives an approximate
expression for reliability as a function of the link failure probability, eliminating the need to resample for different
values of the failure probability. Furthermore, it gives insight on how the routings of the logical topology on the
physical topology impact network reliability. We show that maximizing the min cut of the (layered) network maximizes
reliability in the low failure probability regime. Based on this observation, we develop algorithms for routing the logical
topology to maximize reliability.
Title :Downlink Capacity of Hybrid Cellular Ad Hoc Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/downlink-capacity-hybrid-cellular-ad-hoc-networks
Abstract : Augmenting cellular networks with shorter multihop wireless links that carry traffic to/from a base station
can be expected to facilitate higher rates and improved spatial reuse, there- fore potentially yielding increased
wireless capacity. The resulting network is referred to as a hybrid network. However, while this approach can result in
shorter range higher rate links and improved spatial reuse, which together favor a capacity increase, it relies on
multihop forwarding, which is detrimental to the overall capacity. In this paper, our objective is to evaluate the impact
of these conflicting factors on the overall capacity of the hybrid network. We formally define the capacity of the
network as the maximum possible downlink throughput under the constraint of max-min fairness. We analytically
compute the capacity of both one- and two-dimensional hybrid networks with regular placement of base stations and
users. While almost no capacity benefits are possible with linear networks due to poor spatial reuse, significant
capacity improvements with two-dimensional networks are possible in certain parametric regimes. Our simulations
also demonstrate that in both cases, if the users are placed randomly, the behavioral results are similar to those with
regular placement of users.
M.E Computer Science Networking Projects
Title :Countermeasures against MAC Address Spoofing in Public Wireless Networks using Lightweight Agents
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/countermeasures-mac-address-spoofing-public-wireless-networks
Abstract : As wireless network usage thrivingly grows, MAC address spoofing recently poses a serious security

threat to a public wireless network. In the past, several schemes have been proposed to leverage this problem.
However, these previous methods incur high deployment costs in employing countermeasure protocols. In this paper,
we present a lightweight agent-based access control framework to counter MAC address spoofing threats. The
proposed framework has four operating modes to run according to user needs of system performance and wireless
security. Therefore, the framework provides much more flexibility in employing a variety of security protocols, and
performance-security trade-offs. With a prototype implementation, the preliminary experimental results indicate that
the proposed framework has only 20% performance degradation in burst packet transfer under the most rigorous
security consideration, which shows the potential feasibility.
Title :Countermeasures against MAC Address Spoofing in Public Wireless Networks using Lightweight Agents
Language : NS2
Project Link : http://kasanpro.com/p/ns2/countermeasures-mac-address-spoofing-public-wireless-network
Abstract : As wireless network usage thrivingly grows, MAC address spoofing recently poses a serious security
threat to a public wireless network. In the past, several schemes have been proposed to leverage this problem.
However, these previous methods incur high deployment costs in employing countermeasure protocols. In this paper,
we present a lightweight agent-based access control framework to counter MAC address spoofing threats. The
proposed framework has four operating modes to run according to user needs of system performance and wireless
security. Therefore, the framework provides much more flexibility in employing a variety of security protocols, and
performance-security trade-offs. With a prototype implementation, the preliminary experimental results indicate that
the proposed framework has only 20% performance degradation in burst packet transfer under the most rigorous
security consideration, which shows the potential feasibility.
Title :Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks With Elastic and Inelastic Traffic
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/scheduling-fair-resource-allocation-ad-hoc-networks-with-elastic-inelastic-traffic
Abstract : This paper studies the problem of congestion control and scheduling in ad hoc wireless networks that have
to support a mixture of best-effort and real-time traffic. Optimization and stochastic network theory have been
successful in designing architectures for fair resource allocation to meet long-term throughput demands. However, to
the best of our knowledge, strict packet delay deadlines were not considered in this framework previously. In this
paper, we propose a model for incorporating the quality-of-service (QoS) requirements of packets with deadlines in
the optimization framework. The solution to the problem results in a joint congestion control and scheduling algorithm
that fairly allocates resources to meet the fairness objectives of both elastic and inelastic flows and per-packet delay
requirements of inelastic flows.
Title :Downlink Capacity of Hybrid Cellular Ad Hoc Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/downlink-capacity-hybrid-cellular-ad-hoc-networks-code
Abstract : Augmenting cellular networks with shorter multihop wireless links that carry traffic to/from a base station
can be ex- pected to facilitate higher rates and improved spatial reuse, there- fore potentially yielding increased
wireless capacity. The resulting network is referred to as a hybrid network. However, while this approach can result in
shorter range higher rate links and improved spatial reuse, which together favor a capacity increase, it relies on
multihop forwarding, which is detrimental to the overall capacity. In this paper, our objective is to evaluate the impact
of these con- flicting factors on the overall capacity of the hybrid network. We formally define the capacity of the
network as the maximum possible downlink throughput under the constraint of max-min fairness. We analytically
compute the capacity of both one- and two-dimensional hybrid networks with regular placement of base stations and
users. While almost no capacity benefits are possible with linear networks due to poor spatial reuse, significant
capacity improvements with two-dimensional networks are possible in certain parametric regimes. Our simulations
also demonstrate that in both cases, if the users are placed randomly, the behavioral results are similar to those with
regular placement of users.
Title :Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks With Elastic and Inelastic Traffic
Language : NS2
Project Link : http://kasanpro.com/p/ns2/scheduling-resource-allocation-ad-hoc-networks-with-elastic-inelastic-traffic
Abstract : This paper studies the problem of congestion control and scheduling in ad hoc wireless networks that have

to support a mixture of best-effort and real-time traffic. Optimization and stochastic network theory have been
successful in designing architectures for fair resource allocation to meet long-term throughput demands. However, to
the best of our knowledge, strict packet delay deadlines were not considered in this framework previously. In this
paper, we propose a model for incorporating the quality-of-service (QoS) requirements of packets with deadlines in
the optimization framework. The solution to the problem results in a joint congestion control and scheduling algorithm
that fairly allocates resources to meet the fairness objectives of both elastic and inelastic flows and per-packet delay
requirements of inelastic flows.
M.E Computer Science Networking Projects
Title :Medical Data Compression and Transmission in Wireless Ad Hoc Networks
Language : Java
Project Link : http://kasanpro.com/p/java/medical-data-compression-transmission-wireless-ad-hoc-networks
Abstract : A wireless ad hoc network (WANET) is a type of wireless network aimed to be deployed in a disaster area
in order to collect data of patients and improve medical facilities. The WANETs are composed of several small nodes
scattered in the disaster area. The nodes are capable of sending (wirelessly) the collected medical data to the base
stations. The limited battery power of nodes and the transmission of huge medical data require an energy efficient
approach to preserve the quality of service of WANETs. To address this issue, we propose an optimizationbased
medical data compression technique, which is robust to transmission errors. We propose a fuzzy-logic-based route
selection technique to deliver the compressed data that maximizes the lifetime of WANETs. The technique is fully
distributed and does not use any geographical/location information. We demonstrate the utility of the proposed work
with simulation results. The results show that the proposed work effectively maintains connectivity of WANETs and
prolongs network lifetime.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Medical Data Compression and Transmission in Wireless Ad Hoc Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/medical-data-compression-transmission
Abstract : A wireless ad hoc network (WANET) is a type of wireless network aimed to be deployed in a disaster area
in order to collect data of patients and improve medical facilities. The WANETs are composed of several small nodes
scattered in the disaster area. The nodes are capable of sending (wirelessly) the collected medical data to the base
stations. The limited battery power of nodes and the transmission of huge medical data require an energy efficient
approach to preserve the quality of service of WANETs. To address this issue, we propose an optimizationbased
medical data compression technique, which is robust to transmission errors. We propose a fuzzy-logic-based route
selection technique to deliver the compressed data that maximizes the lifetime of WANETs. The technique is fully
distributed and does not use any geographical/location information. We demonstrate the utility of the proposed work
with simulation results. The results show that the proposed work effectively maintains connectivity of WANETs and
prolongs network lifetime.
Title :A Survey on Scheduling Algorithms for Wireless Sensor Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/survey-scheduling-algorithms-wireless-sensor-networks
Abstract : Wireless sensor networks(WSN) have wide range of application such as traffic analysis, environmental
monitoring, industrial process monitoring, and tactical systems. Large-scale wireless sensor networks are expected to
play increasingly important role in future civilian and military application. Designing of MAC layer protocol for wireless
sensor network is a challenging task due to limited battery power and limited bandwidth. Time Division Multiple
Access Protocol solves both problems at the level of MAC layer. Various scheduling method for TDMA protocol with
different objective have been proposed for wireless sensor networks. In this paper, we first outline the sensor network
properties that are crucial for the design of TDMA protocols and then, we describe several TDMA protocols which are
proposed for sensor networks. Finally, we point out open research issue with regard to TDMA protocols.
Title :Middleware for Differentiated Quality in Spontaneous Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/middleware-differentiated-quality-spontaneous-networks

Abstract : Spontaneous-network management requires application-driven middleware to address differentiated


application-specific equirements at runtime. Real Ad hoc Multihop Peer-to-peer (RAMP) middleware easily deploys
over existing and heterogeneous wireless networks, supporting adaptive and per-application strategies even in
challenging scenarios, such as multimedia streaming.
Title :Middleware for Differentiated Quality in Spontaneous Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/middleware-differentiated-quality-spontaneous-networks-code
Abstract : Spontaneous-network management requires application-driven middleware to address differentiated
application-specific equirements at runtime. Real Ad hoc Multihop Peer-to-peer (RAMP) middleware easily deploys
over existing and heterogeneous wireless networks, supporting adaptive and per-application strategies even in
challenging scenarios, such as multimedia streaming.
M.E Computer Science Networking Projects
Title :Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/efficient-scheduling-periodic-aggregation-queries-multihop-sensor-networks
Abstract : In this paper, we study periodic query scheduling for data aggregation with minimum delay under various
wireless interference models. Given a set of periodic aggregation queries, each query has its own period and the
subset of source nodes containing the data. We first propose a family of efficient and effective real-time scheduling
protocols that can answer every job of each query task within a relative delay under resource constraints by
addressing the following tightly coupled tasks: routing, transmission plan constructions, node activity scheduling, and
packet scheduling. Based on our protocol design, we further propose schedulability test schemes to efficiently and
effectively test whether, for a set of queries, each query job can be finished within a finite delay. Our theoretical
analysis shows that our methods achieve at least a constant fraction of the maximum possible total utilization for
query tasks, where the constant depends on wireless interference models. We also conduct extensive simulations to
validate the proposed protocol and evaluate its practical performance. The simulations corroborate our theoretical
analysis.
Title :Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/efficient-scheduling-periodic-aggregation-queries-multihop-sensor-networks-code
Abstract : In this paper, we study periodic query scheduling for data aggregation with minimum delay under various
wireless interference models. Given a set of periodic aggregation queries, each query has its own period and the
subset of source nodes containing the data.We first propose a family of efficient and effective real-time scheduling
protocols that can answer every job of each query task within a relative delay under resource constraints by
addressing the following tightly coupled tasks: routing, transmission plan constructions, node activity scheduling, and
packet scheduling. Based on our protocol design, we further propose schedulability test schemes to efficiently and
effectively test whether, for a set of queries, each query job can be finished within a finite delay. Our theoretical
analysis shows that our methods achieve at least a constant fraction of the maximum possible total utilization for
query tasks, where the constant depends on wireless interference models. We also conduct extensive simulations to
validate the proposed protocol and evaluate its practical performance. The simulations corroborate our theoretical
analysis.
Title :Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis
Testing
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/mobile-replica-sensor-node-attacks-detection-using-sequential-hypothesis-testing-code
Abstract : Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise

sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node
attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control
over much of the network. Several replica node detection schemes have been proposed in the literature to defend
against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do
not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and
effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our
knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show
analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust
manner at the cost of reasonable overheads.
Title :A Localized Algorithm for Restoring Internode Connectivity in Networks of Moveable Sensors
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/restoring-internode-connectivity-networks-moveable-sensors
Abstract : Recent years have witnessed a growing interest in the applications of wireless sensor networks (WSNs).
In some of these applications, such as search and rescue and battlefield reconnaissance, a set of mobile nodes is
deployed in order to collectively survey an area of interest and/or perform specific surveillance tasks. Such
collaboration among the sensors requires inter node interaction and thus maintaining network connectivity is critical to
the effectiveness of WSNs. While connectivity can be provisioned at startup time and then sustained through careful
coordination when nodes move, a sudden failure of a node poses a challenge since the network may get partitioned.
This paper presents RIM; a distributed algorithm for Recovery through Inward Motion. RIM strives to efficiently restore
the network connectivity after a node failure. Instead of performing a network wide analysis to assess the impact of
the node failure and orchestrate a course of action, RIM triggers a local recovery process by relocating the neighbors
of the lost node. In addition to minimizing the messaging overhead, RIM opts to reduce the distance that the individual
nodes have to travel during the recovery. The correctness of the RIM algorithm is proven and the incurred overhead is
analyzed. The performance of RIM is validated through simulation experiments.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :An Ant Colony Optimization Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/ant-colony-optimization-maximizing-lifetime-heterogeneous-wsn
Abstract : Maximizing the lifetime of wireless sensor networks (WSNs) is a challenging problem. Although some
methods exist to address the problem in homogeneous WSNs, research on this problem in heterogeneous WSNs
have progressed at a slow pace. Inspired by the promising performance of ant colony optimization (ACO) to solve
combinatorial problems, this paper proposes an ACO-based approach that can maximize the lifetime of
heterogeneous WSNs. The methodology is based on finding the maximum number of disjoint connected covers that
satisfy both sensing coverage and network connectivity. A construction graph is designed with each vertex denoting
the assignment of a device in a subset. Based on pheromone and heuristic information, the ants seek an optimal path
on the construction graph to maximize the number of connected covers. The pheromone serves as a metaphor for the
search experiences in building connected covers. The heuristic information is used to reflect the desirability of device
assignments. A local search procedure is designed to further improve the search efficiency. The proposed approach
has been applied to a variety of heterogeneous WSNs. The results show that the approach is effective and efficient in
finding high-quality solutions for maximizing the lifetime of heterogeneous WSNs.
M.E Computer Science Networking Projects
Title :An Ant Colony Optimization Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/ant-colony-optimization-maximizing-node-lifetime-heterogeneous-wsn
Abstract : Maximizing the lifetime of wireless sensor networks (WSNs) is a challenging problem. Although some
methods exist to address the problem in homogeneous WSNs, research on this problem in heterogeneous WSNs
have progressed at a slow pace. Inspired by the promising performance of ant colony optimization (ACO) to solve
combinatorial problems, this paper proposes an ACO-based approach that can maximize the lifetime of
heterogeneous WSNs. The methodology is based on finding the maximum number of disjoint connected covers that
satisfy both sensing coverage and network connectivity. A construction graph is designed with each vertex denoting
the assignment of a device in a subset. Based on pheromone and heuristic information, the ants seek an optimal path

on the construction graph to maximize the number of connected covers. The pheromone serves as a metaphor for the
search experiences in building connected covers. The heuristic information is used to reflect the desirability of device
assignments. A local search procedure is designed to further improve the search efficiency. The proposed approach
has been applied to a variety of heterogeneous WSNs. The results show that the approach is effective and efficient in
finding high-quality solutions for maximizing the lifetime of heterogeneous WSNs.
Title :An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor
Networks
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/secure-data-centric-routing-protocols-hierarchical-wireless-sensor-networks-implement
Abstract : This paper deals with an efficient key distribution scheme which is useful to secure data-centric routing
protocols in Wireless Sensor Networks. Similar to these routing protocols, the proposed scheme bootstraps secure
key distribution with a centralized process which gives a multi-level hierarchical organization to WSNs. The originality
of this work is to permit to use local key distribution process to establish Group Key and Pairwise Key. These two
types of keys are useful to secure respectively data request diffusion and data forwarding through multi-hop routing
paths. Moreover, when the WSN topology changes, the proposed scheme allows secure WSN reorganization.
Security analysis explains that our proposed scheme can withstand several possible attacks against WSNs. A
comparison to other solutions based on one KDC shows that the proposed scheme is significantly more efficient and
scalable. This is well verified through simulations with TOSSIM under TinyOS using NesC language
Title :An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor
Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/secure-data-centric-routing-protocols-hierarchical-wireless-sensor-networks
Abstract : This paper deals with an efficient key distribution scheme which is useful to secure data-centric routing
protocols in Wireless Sensor Networks. Similar to these routing protocols, the proposed scheme bootstraps secure
key distribution with a centralized process which gives a multi-level hierarchical organization to WSNs. The originality
of this work is to permit to use local key distribution process to establish Group Key and Pairwise Key. These two
types of keys are useful to secure respectively data request diffusion and data forwarding through multi-hop routing
paths. Moreover, when the WSN topology changes, the proposed scheme allows secure WSN reorganization.
Security analysis explains that our proposed scheme can withstand several possible attacks against WSNs. A
comparison to other solutions based on one KDC shows that the proposed scheme is significantly more efficient and
scalable. This is well verified through simulations with TOSSIM under TinyOS using NesC language
Title :Implementation of Simulation Tools for Wireless Sensor Network
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/implementation-simulation-tools-wireless-sensor-network
Abstract : NS2 is a flatform used to perpared network topology and making simulation between network nodes. In
this project implementation of new flat form for wireless network simulation introduced the project consist of the nodes
as components such as server, client, laptop, router and etc. As in the NS2 flatform "Re Layout" Feature is also
implemented.
Simulation between the nodes are designed in the system by simulation from every node to the base station. Since all
the nodes are wireless nodes, Data Transfer try to find the routing to the base station through Neighbour intermediate
Nodes. These intermedia node finding concept is declared by shortest distance between the source node and the
distance should be foursabce by the source wireless Node are the previous Node.
Thus the whole project is the implementation of new GUI for the wireless sensor network simulation.
Title :A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/delay-aware-data-collection-network-structure-wireless-sensor-networks-code
Abstract : Wireless sensor networks utilize large numbers of wireless sensor nodes to collect information from their

sensing terrain. Wireless sensor nodes are battery-powered devices. En- ergy saving is always crucial to the lifetime
of a wireless sensor network. Recently, many algorithms are proposed to tackle the energy saving problem in wireless
sensor networks. In these algorithms, however, data collection efficiency is usually compro- mised in return for
gaining longer network lifetime. There are strong needs to develop wireless sensor networks algorithms with
optimization priorities biased to aspects besides energy saving. In this paper, a delay-aware data collection network
structure for wireless sensor networks is proposed. The objective of the proposed network structure is to minimize
delays in the data collection processes of wireless sensor networks. Two network formation algorithms are designed
to construct the proposed network structure in a centralized and a decentralized approach. Performances of the
proposed network structure are evaluated using computer simulations. Simulation results show that, when comparing
with other common network structures in wireless sensor networks, the proposed network structure is able to shorten
the delays in the data collection process significantly.
M.E Computer Science Networking Projects
Title :A Voronoi Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/dv-hop-localization-system-sensor-networks
Abstract : Localization systems have been identified as a key issue to the development and operation of the Wireless
Sensor Networks (WSN). A DV-Hop localization system works by trans- forming the distance to all beacon nodes
from hops to units of length measurement (e.g., meters, feet) using the average size of a hop as a correction factor.
Despite its advantages, a DV-Hop algorithm has some disadvantages, such as its large communication cost that
limits its scalability, and its mapping from hops to distance units that introduces errors that are propagated to the
computation of a node location. This last issue has been solved by some recent works, but the scalability problem still
is an open problem that limits this technique to small or medium sized networks. In this work, we propose a novel
approach that uses Voronoi diagrams in order to scale a DV- Hop localization algorithm while mantaining or even
reducing its localization error. Two types of localization can result from the proposed algorithm: the physical location
of the node (e.g., latitude, longitude), or a region limited by the node's Voronoi cell. The algorithm evaluation is
performed by comparison with similar algorithms. We show how the proposed algorithm can scale in different aspects
such as communication and processing costs when increasing the number of nodes and beacons.
Title :A Voronoi Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/dv-hop-localization-system-sensor-networks-code
Abstract : Localization systems have been identified as a key issue to the development and operation of the Wireless
Sensor Networks (WSN). A DV-Hop localization system works by trans- forming the distance to all beacon nodes
from hops to units of length measurement (e.g., meters, feet) using the average size of a hop as a correction factor.
Despite its advantages, a DV-Hop algorithm has some disadvantages, such as its large communication cost that
limits its scalability, and its mapping from hops to distance units that introduces errors that are propagated to the
computation of a node location. This last issue has been solved by some recent works, but the scalability problem still
is an open problem that limits this technique to small or medium sized networks. In this work, we propose a novel
approach that uses Voronoi diagrams in order to scale a DV- Hop localization algorithm while mantaining or even
reducing its localization error. Two types of localization can result from the proposed algorithm: the physical location
of the node (e.g., latitude, longitude), or a region limited by the node's Voronoi cell. The algorithm evaluation is
performed by comparison with similar algorithms. We show how the proposed algorithm can scale in different aspects
such as communication and processing costs when increasing the number of nodes and beacons.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Edge Self-Monitoring for Wireless Sensor Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/edge-self-monitoring-wireless-sensor-networks-code
Abstract : Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing
schemes assume the existence of sufficient number of active nodes to carry out monitoring operations. Such an
assumption, however, is often difficult for a large-scale sensor network. In this work, we focus on designing an
efficient scheme integrated with good self-monitoring capability as well as providing an infrastructure for various
security protocols using local monitoring. To the best of our knowledge, we are the first to present the formal study on

optimizing network topology for edge self-monitoring in WSNs. We show that the problem is NP-complete even under
the unit disk graph (UDG) model and give the upper bound on the approximation ratio in various graph models. We
provide polynomial-time approximation scheme (PTAS) algorithms for the problem in some specific graphs, for
example, the monitoring-set- bounded graph. We further design two distributed polynomial algorithms with provable
approximation ratio. Through comprehensive simulations, we evaluate the effectiveness of our design.
Title :Countermeasure Malicious Attacks in Edge Self Monitoring
Language : NS2
Project Link : http://kasanpro.com/p/ns2/countermeasure-malicious-attacks-edge-self-monitoring
Abstract : One of the most severe security threats in sensor networks is node compromise. Once some nodes are
compromised, the attackers can use them to mount a variety of attacks. Local monitoring is an effective mechanism
for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of
active nodes to carry out monitoring operations. Such an assumption, however, is often difficult for a large-scale
sensor network. In this work, we focus on designing an efficient scheme integrated with good self-monitoring
capability. We present the formal study on optimizing network topology for edge self-monitoring in WSNs. We used
unit disk graph (UDG) model and generated patch set of monitoring nodes. We provide end-to-end detection of
wormhole attack (EDWA) to unselect malicious nodes in the patch set and Local Maximal Element (LME) algorithm
for the patch set selection.
Title :Countermeasure Malicious Attacks in Edge Self Monitoring
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/prevent-malicious-attacks-edge-self-monitoring
Abstract : One of the most severe security threats in sensor networks is node compromise. Once some nodes are
compromised, the attackers can use them to mount a variety of attacks. Local monitoring is an effective mechanism
for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of
active nodes to carry out monitoring operations. Such an assumption, however, is often difficult for a large-scale
sensor network. In this work, we focus on designing an efficient scheme integrated with good self-monitoring
capability. We present the formal study on optimizing network topology for edge self-monitoring in WSNs. We used
unit disk graph (UDG) model and generated patch set of monitoring nodes. We provide end-to-end detection of
wormhole attack (EDWA) to unselect malicious nodes in the patch set and Local Maximal Element (LME) algorithm
for the patch set selection.
M.E Computer Science Networking Projects
Title :Cluster Based Peer To Peer Adhoc Middleware
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/cluster-based-peer-to-peer-adhoc-middleware
Abstract : Spontaneous (or opportunistic) networks are multi-hop ad-hoc networks where nodes opportunistically
exploit peer-to-peer contacts to share content and available resources in an impromptu way. Even if spontaneous
networking has recently received growing interest, there is still the lack of impactful and wide-scale applications fully
exploiting its potential. We claim that this is due to the intrinsic complexity of spontaneous network management,
unsuitable to be directly handled by application developers. Therefore, this paper proposes a novel easy-to-use
middleware, using cluster based approach, for the autonomic, cross-, and application-layer management of
spontaneous networks. The intuition behind the proposed design is that by logically grouping users sharing in similar
quality of data together, we can improve query efficiency. To efficiently route and broadcast messages across/within
interest clusters, a hypercube topology is employed. In addition, to ensure that the structure of the interest clusters is
not altered by arbitrary node insertions/deletion.
Title :Cluster Based Peer To Peer Adhoc Middleware
Language : NS2
Project Link : http://kasanpro.com/p/ns2/cluster-based-peer-adhoc-middleware
Abstract : Spontaneous (or opportunistic) networks are multi-hop ad-hoc networks where nodes opportunistically
exploit peer-to-peer contacts to share content and available resources in an impromptu way. Even if spontaneous
networking has recently received growing interest, there is still the lack of impactful and wide-scale applications fully

exploiting its potential. We claim that this is due to the intrinsic complexity of spontaneous network management,
unsuitable to be directly handled by application developers. Therefore, this paper proposes a novel easy-to-use
middleware, using cluster based approach, for the autonomic, cross-, and application-layer management of
spontaneous networks. The intuition behind the proposed design is that by logically grouping users sharing in similar
quality of data together, we can improve query efficiency. To efficiently route and broadcast messages across/within
interest clusters, a hypercube topology is employed. In addition, to ensure that the structure of the interest clusters is
not altered by arbitrary node insertions/deletion.
Title :Jamming Aware Traffic Allocation for Multiple Path Routing Using Portfolio Selection
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/jamming-aware-traffic-allocation-multiple-path-routing-using-portfolio-selection
Abstract : Multiple-path source routing protocols allow a data source node to distribute the total traffic among
available paths. In this article, we consider the problem of jamming-aware source routing in which the source node
performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic
allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We
show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm
based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the
impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the
achievable throughput using our proposed traffic allocation method in several scenarios.
Title :Multicast Support in Input Queued Switches with Low Matching Overhead
Language : NS2
Project Link : http://kasanpro.com/p/ns2/multicast-support-input-queued-switches-low-matching-overhead
Abstract : This letter addresses the scalability problems in- duced by high complexity of multicast scheduling
algorithms in high-speed switches. Based on a two-phase (request-grant) scheduling scheme in a N N switch, a more
scalable approach instead of traditional iterative schedulings is presented, which reduces the matching overhead from
O(kN ) to O(N ) by selecting one head-of-line cell for requesting when k multicast queues are allocated at each input
port. Simulation results show that the proposed algorithm exhibits a good switching performance in terms of
throughput and average delay under various traffic patterns.
Title :Multicast Support in Input Queued Switches with Low Matching Overhead
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/multicast-support-input-queued-switches-low-matching-overhead-code
Abstract : This letter addresses the scalability problems in- duced by high complexity of multicast scheduling
algorithms in high-speed switches. Based on a two-phase (request-grant) scheduling scheme in a N N switch, a more
scalable approach instead of traditional iterative schedulings is presented, which reduces the matching overhead from
O(kN ) to O(N ) by selecting one head-of-line cell for requesting when k multicast queues are allocated at each input
port. Simulation results show that the proposed algorithm exhibits a good switching performance in terms of
throughput and average delay under various traffic patterns.
M.E Computer Science Networking Projects
Title :Designing of Energy aware Quality of Service (QoS) based routing protocol for Efficiency Improvement in
Wireless Sensor Network (WSN)
Language : NS2
Project Link : http://kasanpro.com/p/ns2/routing-protocol-efficiency-improvement-wireless-sensor-network
Abstract : New advancements in Wireless Sensor Networks (WSN), lead to many novel routing protocols specifically
designed by considering QoS and energy efficiency as the main objective, to maximize the whole network efficiency
and lifetime. As the issue of Quality of Service (QoS) provisioning in WSN networks has been acquiring increasing
importance, particularly in view of the domains of application of these networks i.e., defense operations, emergency
rescue missions, Health and Multimedia traffic, where we have need of more accuracy and guarantee for timely data
transfer, therefore, to fulfill the requirements of these real time applications associated with wireless sensor networks,
it is required that more reliable and dependable energy aware QoS based routing protocol in WSN should be

developed for the usage of sensor nodes efficiently. The objective of this research is to focus on challenges related to
the architecture and operation of handling QoS routing traffic in sensor network and designing an energy-aware QoS
based routing protocol for Wireless Sensor Network (WSN) which will stumble on least cost, transmission energy,
error rate and other communication parameters to enhance the efficiency of WSN performance in Military, Health and
Environmental applications. The tasks of the research project started with the deep Investigation of the problem
requirement followed by Designing, Development, Simulation, Modeling and Finally comprehensive analysis of the
simulation results. Two approaches, WSN Nodes with normal condition (Before any assumption) and WSN Nodes
after Secondary Route & Gateway assumption a part, are used. Both approaches works fine and reduces the
congestion of the network along with enhanced energy life, resulting the QoS of the network and increased energy
efficiency in sufficient amount
Title :Designing of Energy aware Quality of Service (QoS) based routing protocol for Efficiency Improvement in
Wireless Sensor Network (WSN)
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/routing-protocol-efficiency-improvement-wireless-sensor-network-code
Abstract : New advancements in Wireless Sensor Networks (WSN), lead to many novel routing protocols specifically
designed by considering QoS and energy efficiency as the main objective, to maximize the whole network efficiency
and lifetime. As the issue of Quality of Service (QoS) provisioning in WSN networks has been acquiring increasing
importance, particularly in view of the domains of application of these networks i.e., defense operations, emergency
rescue missions, Health and Multimedia traffic, where we have need of more accuracy and guarantee for timely data
transfer, therefore, to fulfill the requirements of these real time applications associated with wireless sensor networks,
it is required that more reliable and dependable energy aware QoS based routing protocol in WSN should be
developed for the usage of sensor nodes efficiently. The objective of this research is to focus on challenges related to
the architecture and operation of handling QoS routing traffic in sensor network and designing an energy-aware QoS
based routing protocol for Wireless Sensor Network (WSN) which will stumble on least cost, transmission energy,
error rate and other communication parameters to enhance the efficiency of WSN performance in Military, Health and
Environmental applications. The tasks of the research project started with the deep Investigation of the problem
requirement followed by Designing, Development, Simulation, Modeling and Finally comprehensive analysis of the
simulation results. Two approaches, WSN Nodes with normal condition (Before any assumption) and WSN Nodes
after Secondary Route & Gateway assumption a part, are used. Both approaches works fine and reduces the
congestion of the network along with enhanced energy life, resulting the QoS of the network and increased energy
efficiency in sufficient amount.
Title :Mobile Wireless Sensor Network Fault Recovery
Language : NS2
Project Link : http://kasanpro.com/p/ns2/mobile-wireless-sensor-network-fault-recovery
Abstract : Sensor nodes are expected to operate autonomously in unattended environments and potentially in large
numbers. Failures are inevitable in wireless sensor networks due to inhospitable environment and unattended
deployment. The data communication and various network operations cause energy depletion in sensor nodes and
therefore, it is common for sensor nodes to exhaust its energy completely and stop operating. This may cause
connectivity and data loss. Therefore, it is necessary that network failures are detected in advance and appropriate
measures are taken to sustain network operation. In this paper we survey cellular architecture and cluster-based to
sustain network operation in the event of failure cause of energy-drained nodes. The failure detection and recovery
technique recovers the cluster structure.
Title :Fault Recovery using Mobile Element Replacement in WSN
Language : NS2
Project Link : http://kasanpro.com/p/ns2/fault-recovery-mobile-element-replacement-wsn
Abstract :
Title :EnergyPath based Energy efficient routing in WSN
Language : NS2
Project Link : http://kasanpro.com/p/ns2/energypath-based-energy-efficient-routing-wsn
Abstract : In this paper, we propose a Cluster Based Routing Scheme with EnergyPath Construction for prolong the
sensor network lifetime. It was designed by considering QoS and energy efficiency as the main objective. this

achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. In this scheme
first we Cluster the network by using new factors and then construct a energypath for sending aggregated data to the
base station which can better handle the heterogeneous energy capacities. Simulation results show that the scheme
can remarkably extend the network lifetime and amount of data gathered.
M.E Computer Science Networking Projects
Title :Qos Aware energy efficient routing in WSN using EnergyPath
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/qos-aware-energy-efficient-routing-wsn-energypath
Abstract :
Title :Self-Reconfigurable Wireless Mesh Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/self-reconfigurable-wireless-mesh-networks-code
Abstract : During their lifetime, multi-hop wireless mesh networks (WMNs) experience frequent link failures caused
by channel interference, dynamic obstacles and/or applications' bandwidth demands. These failures cause severe
performance degradation in WMNs or require expensive, manual network management for their real-time recovery.
This paper presents an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN to
autonomously recover from local link failures to preserve network performance. By using channel and radio diversities
in WMNs, ARS generates necessary changes in local radio and channel assignments in order to recover from
failures. Next, based on the thus-generated configuration changes, the system cooperatively reconfigures network
settings among local mesh routers. ARS has been implemented and evaluated extensively on our IEEE 802.11-based
WMN test-bed as well as through ns-2-based simulation. Our evaluation results show that ARS outperforms existing
failure-recovery schemes in improving channel-efficiency by more than 90%and in the ability of meeting the
applications' bandwidth demands by an average of 200%.
Title :Fully Anonymous Profile Matching in Mobile Social Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/fully-anonymous-profile-matching-mobile-social-networks
Abstract : In this paper, we study user profile matching with privacy-preservation in mobile social networks (MSNs)
and introduce a family of novel profile matching protocols. We first propose an explicit Comparison-based Profile
Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the
initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing
their attribute values from disclosure. We then propose an implicit Comparison-based Profile Matching protocol
(iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the
responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The
initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each
category are prepared by the responder, and only one message can be obtained by the initiator according to the
comparison result on a single attribute. We further generalize the iCPM to an implicit Predicate-based Profile
Matching protocol (iPPM) which allows complex comparison cri- teria spanning multiple attributes. The anonymity
analysis shows all these protocols achieve the confidentiality of user profiles. In addition, the eCPM reveals the
comparison result to the initiator and provides only conditional anonymity; the iCPM and the iPPM do not reveal the
result at all and provide full anonymity. We analyze the communication overhead and the anonymity strength of the
protocols. We then present an enhanced version of the eCPM, called eCPM+, by combining the eCPM with a novel
prediction-based adaptive pseudonym change strategy. The performance of the eCPM and the eCPM+ are
comparatively studied through extensive trace-based simulations. Simulation results demonstrate that the eCPM+
achieves significantly higher anonymity strength with slightly larger number of pseudonyms than the eCPM.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Fully Anonymous Profile Matching in Mobile Social Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/fully-anonymous-profile-matching-mobile-social-networks-code

Abstract : In this paper, we study user profile matching with privacy-preservation in mobile social networks (MSNs)
and introduce a family of novel profile matching protocols. We first propose an explicit Comparison-based Profile
Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the
initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing
their attribute values from disclosure. We then propose an implicit Comparison-based Profile Matching protocol
(iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the
responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The
initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each
category are prepared by the responder, and only one message can be obtained by the initiator according to the
comparison result on a single attribute. We further generalize the iCPM to an implicit Predicate-based Profile
Matching protocol (iPPM) which allows complex comparison cri- teria spanning multiple attributes. The anonymity
analysis shows all these protocols achieve the confidentiality of user profiles. In addition, the eCPM reveals the
comparison result to the initiator and provides only conditional anonymity; the iCPM and the iPPM do not reveal the
result at all and provide full anonymity. We analyze the communication overhead and the anonymity strength of the
protocols. We then present an enhanced version of the eCPM, called eCPM+, by combining the eCPM with a novel
prediction-based adaptive pseudonym change strategy. The performance of the eCPM and the eCPM+ are
comparatively studied through extensive trace-based simulations. Simulation results demonstrate that the eCPM+
achieves significantly higher anonymity strength with slightly larger number of pseudonyms than the eCPM.
Title :Participatory Privacy: Enabling Privacy in Participatory Sensing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/participatory-privacy-enabling-privacy-participatory-sensing
Abstract : Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by
self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired
by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While
research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user
participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not
participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable
privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers
(i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an
efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we discuss a number of
open problems and possible research directions.
M.E Computer Science Networking Projects
Title :Participatory Privacy: Enabling Privacy in Participatory Sensing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/participatory-privacy-enabling-privacy-participatory-sensing-code
Abstract : Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by
self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired
by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While
research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user
participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not
participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable
privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers
(i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an
efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we discuss a number of
open problems and possible research directions.
Title :Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor
Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/multipath-intrusion-tolerance-redundancy-management-heterogeneous-wsn
Abstract : In this paper we propose redundancy management of heterogeneous wireless sensor networks (HWSNs),
utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept
of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability,

timeliness, and security to maximize the system useful lifetime. We formulate the tradeoff as an optimization problem
for dynamically determining the best redundancy level to apply to multipath routing for intrusion tolerance so that the
query response success probability is maximized while prolonging the useful lifetime. Furthermore, we consider this
optimization problem for the case in which a voting-based distributed intrusion detection algorithm is applied to detect
and evict malicious nodes in a HWSN. We develop a novel probability model to analyze the best redundancy level in
terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the
number of voters and the intrusion invocation interval under which the lifetime of a HWSN is maximized. We then
apply the analysis results obtained to the design of a dynamic redundancy management algorithm to identify and
apply the best design parameter settings at runtime in response to environment changes, to maximize the HWSN
lifetime.
Title :Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor
Networks
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/multipath-intrusion-tolerance-redundancy-management-heterogeneous-wsn-code
Abstract : In this paper we propose redundancy management of heterogeneous wireless sensor networks (HWSNs),
utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept
of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability,
timeliness, and security to maximize the system useful lifetime. We formulate the tradeoff as an optimization problem
for dynamically determining the best redundancy level to apply to multipath routing for intrusion tolerance so that the
query response success probability is maximized while prolonging the useful lifetime. Furthermore, we consider this
optimization problem for the case in which a voting-based distributed intrusion detection algorithm is applied to detect
and evict malicious nodes in a HWSN. We develop a novel probability model to analyze the best redundancy level in
terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the
number of voters and the intrusion invocation interval under which the lifetime of a HWSN is maximized. We then
apply the analysis results obtained to the design of a dynamic redundancy management algorithm to identify and
apply the best design parameter settings at runtime in response to environment changes, to maximize the HWSN
lifetime.
Title :Price Differentiation for Communication Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/price-differentiation-communication-networks
Abstract : We study the optimal usage-based pricing problem in a resource-constrained network with one
profit-maximizing service provider and multiple groups of surplus-maximizing users. With the assumption that the
service provider knows the utility function of each user (thus complete information), we find that the complete price
differentiation scheme can achieve a large revenue gain (e.g., 50%) compared to no price differentiation, when the
total network resource is comparably limited and the high willingness to pay users are minorities. However, the
complete price differentiation scheme may lead to a high implementational complexity. To trade off the revenue
against the implementational complexity, we further study the partial price differentiation scheme, and design a
polynomial-time algorithm that can compute the optimal partial differentiation prices. We also consider the incomplete
information case where the service provider does not know which group each user belongs to. We show that it is still
possible to realize price differentiation under this scenario, and provide the sufficient and necessary condition under
which an incentive compatible differentiation scheme can achieve the same revenue as under complete information.
Title :Communication Synchronization in Cluster-Based Sensor Networks for Cyber-Physical Systems
Language : C#

Project Link : http://kasanpro.com/p/c-sharp/communication-synchronization-cluster-based-sensor-networks-cyber-physical-sy


Abstract : A reliable, scalable and low-delay information collection network is an essential component in
Cyber-Physical Systems (CPS). Cluster-based sensor network is a good candidate due to its advantage in increasing
scalability, improving energy efficiency and providing QoS guarantees. However, in such networks, frequent
interactions between the intra-cluster communication and the inter-cluster communication are inevitable, which may
severely downgrade the communication efficiency and hence the network performance if not handled properly. Proper
synchronization among these two types of communications is required. In this paper, we propose two approaches to
schedule the communications in clustered wireless sensor networks aiming at delay-sensitive applications. In the first
approach, an efficient cycle-based synchronous scheduling is proposed to achieve low average packet delay and high
throughput by optimizing the cycle length and transmission order. In the second approach, a novel clustering structure
is introduced to eliminate the necessity of communication synchronization so that packets are transmitted with no
synchronization delay, yielding very low end-to-end packet delay. Our extensive experimental results demonstrate the

superior performance of both approaches. These two approaches are then integrated as a hybrid scheme which
allows smooth switching between them. The hybrid scheme takes advantage of both approaches and enables
cluster-based sensor networks to serve as the fundamental network infrastructure for information collection in CPS.
M.E Computer Science Networking Projects
Title :Communication Synchronization in Cluster-Based Sensor Networks for Cyber-Physical Systems
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/communication-synchronization-cluster-based-sensor-networks-cyber-physical-system
Abstract : A reliable, scalable and low-delay information collection network is an essential component in
Cyber-Physical Systems (CPS). Cluster-based sensor network is a good candidate due to its advantage in increasing
scalability, improving energy efficiency and providing QoS guarantees. However, in such networks, frequent
interactions between the intra-cluster communication and the inter-cluster communication are inevitable, which may
severely downgrade the communication efficiency and hence the network performance if not handled properly. Proper
synchronization among these two types of communications is required. In this paper, we propose two approaches to
schedule the communications in clustered wireless sensor networks aiming at delay-sensitive applications. In the first
approach, an efficient cycle-based synchronous scheduling is proposed to achieve low average packet delay and high
throughput by optimizing the cycle length and transmission order. In the second approach, a novel clustering structure
is introduced to eliminate the necessity of communication synchronization so that packets are transmitted with no
synchronization delay, yielding very low end-to-end packet delay. Our extensive experimental results demonstrate the
superior performance of both approaches. These two approaches are then integrated as a hybrid scheme which
allows smooth switching between them. The hybrid scheme takes advantage of both approaches and enables
cluster-based sensor networks to serve as the fundamental network infrastructure for information collection in CPS.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/verification-inference-positions-vehicular-networks-anonymous-beaconing
Abstract : A number of vehicular networking applications require continuous knowledge of the location of vehicles
and tracking of the routes they follow, including, e.g., real-time traffic monitoring, e-tolling, and liability attribution in
case of accidents. Locating and tracking vehicles has however strong implications in terms of security and user
privacy. On the one hand, there should be a mean for an authority to verify the correctness of positioning information
announced by a vehicle, so as to identify potentially misbehaving cars. On the other, public disclosure of identity and
position of drivers should be avoided, so as not to jeopardize user privacy. In this paper, we address such issues by
introducing A-VIP, a secure, privacy-preserving framework for continuous tracking of vehicles. A-VIP leverages
anonymous position beacons from vehicles, and the cooperation of nearby cars collecting and reporting the beacons
they hear. Such information allows a location authority to verify the positions announced by vehicles, or to infer the
actual ones if needed, without resorting to computationally expensive asymmetric cryptography. We assess the
effectiveness of A-VIP via realistic simulation and experimental testbeds.
Title :Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/verification-inference-positions-vehicular-networks-anonymous-beaconing-code
Abstract : A number of vehicular networking applications require continuous knowledge of the location of vehicles
and tracking of the routes they follow, including, e.g., real-time traffic monitoring, e-tolling, and liability attribution in
case of accidents. Locating and tracking vehicles has however strong implications in terms of security and user
privacy. On the one hand, there should be a mean for an authority to verify the correctness of positioning information
announced by a vehicle, so as to identify potentially misbehaving cars. On the other, public disclosure of identity and
position of drivers should be avoided, so as not to jeopardize user privacy. In this paper, we address such issues by
introducing A-VIP, a secure, privacy-preserving framework for continuous tracking of vehicles. A-VIP leverages
anonymous position beacons from vehicles, and the cooperation of nearby cars collecting and reporting the beacons
they hear. Such information allows a location authority to verify the positions announced by vehicles, or to infer the

actual ones if needed, without resorting to computationally expensive asymmetric cryptography. We assess the
effectiveness of A-VIP via realistic simulation and experimental testbeds.
Title :Information Flow Control for Secure Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/information-flow-control-secure-cloud-computing
Abstract : Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions.
Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models
targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented,
often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud
security than is available today.
In this paper we describe the properties of cloud computing-- Platform-as-a-Service clouds in particular--and review a
range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context.
Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on
security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software
stack in order to effect enforcement.
Title :Information Flow Control for Secure Cloud Computing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/information-flow-control-secure-cloud-computing-code
Abstract : Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions.
Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models
targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented,
often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud
security than is available today.
In this paper we describe the properties of cloud computing-- Platform-as-a-Service clouds in particular--and review a
range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context.
Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on
security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software
stack in order to effect enforcement.
M.E Computer Science Networking Projects
Title :Location Management in Cellular Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/location-management-cellular-networks
Abstract : In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to
as cells. The cellular concept was introduced to reuse the radio frequency. In order to accommodate more
subscribers, the size of cells must be reduced to make more efficient use of the limited frequency spectrum allocation.
This will add to the challenge of some fundamental issues in cellular networks. Location management is one of the
fundamental issues in cellular networks. It deals with how to track subscribers on the move. This chapter surveys
recent research on location management in cellular networks.
Title :Location Management in Cellular Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/location-management-cellular-networks-code
Abstract : In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to
as cells. The cellular concept was introduced to reuse the radio frequency. In order to accommodate more
subscribers, the size of cells must be reduced to make more efficient use of the limited frequency spectrum allocation.
This will add to the challenge of some fundamental issues in cellular networks. Location management is one of the
fundamental issues in cellular networks. It deals with how to track subscribers on the move. This chapter surveys
recent research on location management in cellular networks.

Title :Secured Multipath Routing in HWSN Using Efficient Key Distribution Scheme
Language : NS2
Project Link : http://kasanpro.com/p/ns2/secured-multipath-routing-hwsn-using-efficient-key-distribution-scheme
Abstract : Multipath routing is considered an effective mechanism for fault and intrusion tolerance to improve data
delivery in WSNs. The basic idea is that the probability of at least one path reaching the sink node or base station
increases as we have more paths doing data delivery. In this paper effective redundancy management developed for
a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. We address the
tradeoff between energy consumption vs. QoS gain in reliability, timeliness and security with the goal to maximize the
lifetime of a clustered HWSN while satisfying application QoS requirements in the context of multipath routing. This
paper also deals with an efficient key distribution scheme which is useful to secure routing protocols in Wireless
Sensor Networks. Similar to these routing protocols, the proposed scheme bootstraps secure key distribution which
gives a multi-level hierarchical organization to WSNs. we analyze the optimal amount of redundancy through which
data are routed to a remote sink in the presence of unreliable and malicious nodes, so that the query success
probability is maximized while maximizing the HWSN lifetime. a voting-based distributed intrusion detection algorithm
is applied to remove malicious nodes from the HWSN.
Title :Multicast Due Date Scheduling in Input Queued Switches
Language : NS2
Project Link : http://kasanpro.com/p/ns2/multicast-due-date-scheduling-input-queued-switches
Abstract : The number of newly emerging applications on the internet has created an increasing need for efficient
multicast traffic support. This paper address the challenges of multicast scheduling algorithms in high speed switches,
which reduce the matching overhead by selecting one HOL (Head of Line Cell) using Round Robin Pointer. The
objective of this paper is designing a scheduling algorithm called MDDR (Multicast Due Date Round Robin)
scheduling to achieve maximum throughput and reduced delay. This Due Date (Request Time Slot) for the cells in the
input port. And the Round Robin Pointer is used in the Grand Phase to select one cell in the case of HOL. Our
algorithm achieves better performance then the existing MDRR algorithm since request will be made when Due Date
reaches.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :A Framework and QoS Matchmaking Algorithm for Dynamic Web Services Selection
Language : Java
Project Link : http://kasanpro.com/p/java/qos-matchmaking-algorithm-dynamic-web-services-selection
Abstract : The current Service Oriented Architecture (SOA) standards; namely, the concept of Web services and
service registry lack mechanisms for managing the services' non-functional properties . Such non functional
properties are expressed by the term "Quality of Service (QoS)". QoS for Web services is an important decisive factor
for service selection. In this paper, we propose a generic framework for QoS-based selection mechanism for Web
services. The framework is represented by two models, the Data Model and the Computation Model. The Data Model
establishes ontology to provide a common understanding of the framework, QoS properties and their semantics . We
also introduce QoS modes in the data model, which designate modes of QoS computation to help consumers adapt
to different system conditions of the providers The Computation Model uses a Similarity Distance Measure technique
in the underlying QoS selection mechanism and provides mechanisms for managing the dynamic changes of QoS
properties.. To realize the framework we have established a service registry in United Arab Emirates (UAE),
aeRegistry.
M.E Computer Science Networking Projects
Title :Controlling Packet Loss Using Tokens at the Network Edge
Language : NS2
Project Link : http://kasanpro.com/p/ns2/controlling-packet-loss-using-tokens-network-edge
Abstract : The simultaneous data transmission in internet without packet loss very much depends upon congestion

control. A series of protocols and algorithms have been introduced for controlling congestion. The network congestion
plays a major role in data communication. The performance of the network will be improved by controlling packet loss
using congestion control algorithm. When the data packets are transmitted without intermediate station then packet
loss leads to the retransmission of packets. It takes more time and increases load on network. A new protocol called
STLCC (Stable Token Limited Congestion Control) is proposed for controlling packet loss using tokens. It integrates
TLCC and XCP algorithms. TLCC uses the iterative algorithm to estimate the congestion level of its output link and
the output rate of the sender is controlled according to the algorithm of XCP, so there is almost no packet loss at the
congested link. Thus STLCC can measure the congestion level analytically, allocate network resources according to
the access link, and further keep the congestion control system stable.
Title :MANET-Evaluation of DSDV, AODV and DSR Routing Protocol
Language : NS2
Project Link : http://kasanpro.com/p/ns2/manet-evaluation-dsdv-aodv-dsr-routing-protocol
Abstract : A mobile Ad-Hoc network is a collection of wireless nodes that can dynamically be set up anywhere and
anytime without using any pre-existing network infrastructure. It is an autonomous system in which mobile hosts
connected by wireless links are free to move randomly and often act as routers at the same time. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation and
ease of deployment. In this paper we have compared the performance of three MANET routing protocol DSDV, AODV
and DSR by using NS-2. DSDV is proactive (Table driven routing Protocol) whereas AODV and DSR share similar On
Demand behavior, but the protocol's internal mechanism leads to significant performance difference. A detailed
simulation has been carried out in NS-2. The metrics used for performance analysis are Routing Overload, Delivery
Ratio, And Average Delay.
Title :STORM: A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/storm-integrated-routing-scheduling-traffic-management-ad-hoc-networks
Abstract : A cross-layer framework is introduced for the effective dissemination of real time and elastic traffic in
multi-hop wireless networks called STORM (Scheduling and Traffic Management in Ordered Routing Meshes).
Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth
reservations in a way that bandwidth and delay guarantees can be enforced on a per-hop and end-to-end basis. The
routes established in STORM are shown to be loop-free and real-time packets forwarded along these routes are
shown to have bounded end-to-end delays. Results from detailed simulation experiments show that, compared to a
protocol stack consisting of 802.11 DCF for channel access, AODV or OLSR for unicast routing, and ODMRP for
multicast routing, STORM attains similar or better performance for elastic traffic, and up to two orders of magnitude
improvement in endto-end delays, with twice the amount of data delivery for real-time traffic while inducing
considerably less communication overhead.
Title :Simulation Based Performance Comparison of AODV and DSR Routing Protocols in MANETS
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/simulation-based-performance-comparison-aodv-dsr-routing-protocols-manets
Abstract : Mobile ad-hoc networks (MANETS) are formed by a collection of mobile nodes that have the ability to form
a communication network without the help of any fixed infrastructure. Because of the nature of these networks,
routing protocols play a prominent role in their scalability and overall performance. Due to limited radio transmission
range, multiple hops may be required in order to exchange data among the communicating nodes. So, a key
requirement of any efficient routing protocol is to find a route between two communicating nodes quickly and with low
bandwidth overheads. This study inspects two MANET protocols (i.e. Ad-hoc On-demand Distance Vector routing
(AODV) and Dynamic Source Routing (DSR)) and examines their performance based on variation of node density
and mobility. The performance is determined on the basis of throughput and average end-to-end delay with varying
node density and mobility. AODV with higher node density shows an extreme degradation in performance.
Title :Congestion Control in Computer Networks using a Modified Red AQM Algorithm
Language : NS2
Project Link : http://kasanpro.com/p/ns2/congestion-control-computer-networks-modified-red-aqm-algorithm
Abstract : Congestion control plays an important role in network resource management in very large networks with

heavy traffic. Active Queue Management (AQM) algorithms are one of the approaches to resolve the congestion
problems. Majority of AQM algorithms mainly focus on single queued links. The input queued switches are limited in
throughput and output queued switches require a large speedup factor so our attention is directed towards Combined
Input and Output Queued (CIOQ) switches. A simple modification to the RED AQM algorithm is proposed in this
paper in order to account for the presence of both input and output queues in the switch. The weighted sum of input
and output queue lengths are specifically used as the congestion measure instead of just the output queue length.
The average backlog in the switch is significantly reduced in the low speedup region by using our modified algorithm
as compared to RED without this modification. Simulations show that the loss rate in the modified RED slightly larger
than that in traditional RED but the output queue length in modified RED is tremendously reduced. The congestion
measure which is computed using weighting factor results in reduction of the average backlog. Using our modified
algorithm simulations indicate improvement in the queue length and switch utilization.
M.E Computer Science Networking Projects
Title :Effective Congestion Indication for Performance Improvement of Random Early Detection
Language : NS2
Project Link : http://kasanpro.com/p/ns2/congestion-indication-performance-improvement-random-early-detection
Abstract : A congestion avoidance scheme allows a network to operate in the region of low delay and high
throughput. Such scheme prevent a network from entering in to congested state. RED(Random Early Detection), is
one such congestion avoidance mechanism used for effectively control of congestion. In RED, router uses only the
average queue size, as a congestion indicator and the average queue length is insensitive to input traffic load
variation. Due to this effective incipient congestion becomes difficult to detect and there is no matching between
current queue size and average queue size as in. The present paper deals with these two problems and proposed a
way in which packet dropping is not only based on average queue size but also on the rate of change of input. The
work which is carried out is to find out significant changes in input rate and use this climbing rate as indication of
impending congestion for sources to react quickly. Here we have analyzed the performance of our proposed algorithm
using network simulator ns2.
Title :FloadAutoRED: an AQM scheme to Increase the Overall Performance in Internet Routers
Language : NS2
Project Link : http://kasanpro.com/p/ns2/floadautored-aqm-scheme-increase-overall-performance-internet-routers
Abstract : The Routers in Internet face the problem of congestion due to the increased use of Internet. Active Queue
Management has provided a solution to the problem of congestion control in the Internet routers. But as data traffic is
bursty in routers, burstiness must be handled without comprising the high link utilization and low queuing delay.
Congested link leads to many problems such as large delay, unfairness among flows, underutilization of the link and
packet drops in burst. In the last decade various AQM algorithms have been evolved to solve these problems of
congestion in routers. RED based algorithms use queue length as congestion indicator while some of them use flow
information for more accurate congestion indication. Some AQMs have been designed to use the input rate as the
congestion indicator. In this paper, we propose an AQM scheme that considers the advantages of these queue length
based, rate based and flow based algorithms and satisfies the QOS requirements of the network. This proposed
scheme aims to increase the overall performance even under heavy load and shields the responsive flows form
unresponsive flows to offer a good Quality of Service to all users.

http://kasanpro.com/ieee/final-year-project-center-vellore-reviews
Title :Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/cooperation-versus-multiplexing-multicast-scheduling-algorithms-ofdma-relay-networks
Abstract : With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal
frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in the
4G standards (WiMAX 802.16j, 3GPP LTE-Adv). While unicast flows have received reasonable attention in two-hop
OFDMA relay networks, not much light has been shed on the design of efficient scheduling algorithms for multicast
flows. Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the
latter forms the focus of this paper. We show that while relay cooperation is critical for improving multicast
performance, it must be carefully balanced with the ability to multiplex multicast sessions and hence maximize

aggregate multicast flow. To this end, we highlight strategies that carefully group relays for cooperation to achieve this
balance. We then solve the multicast scheduling problem under two OFDMA subchannelization models. We establish
the NP-hardness of the scheduling problem even for the simpler model and provide efficient algorithms with
approximation guarantees under both models. Evaluation of the proposed solutions reveals the efficiency of the
scheduling algorithms as well as the significant benefits obtained from the multicasting strategy.
Title :Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/cooperation-multiplexing-multicast-scheduling-algorithms-ofdma-relay-networks
Abstract : With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal
frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in the
4G standards (WiMAX 802.16j, 3GPP LTE-Adv). While unicast flows have received reasonable attention in two-hop
OFDMA relay networks, not much light has been shed on the design of efficient scheduling algorithms for multicast
flows. Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the
latter forms the focus of this paper. We show that while relay cooperation is critical for improving multicast
performance, it must be carefully balanced with the ability to multiplex multicast sessions and hence maximize
aggregate multicast flow. To this end, we highlight strategies that carefully group relays for cooperation to achieve this
balance. We then solve the multicast scheduling problem under two OFDMA subchannelization models. We establish
the NP-hardness of the scheduling problem even for the simpler model and provide efficient algorithms with
approximation guarantees under both models. Evaluation of the proposed solutions reveals the efficiency of the
scheduling algorithms as well as the significant benefits obtained from the multicasting strategy.
Title :D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/d2p-distributed-dynamic-pricing-policy-smart-grid-phevs-management
Abstract : Future large-scale deployment of plug-in hybrid electric vehicles (PHEVs) will render massive energy
demand on the electric grid during peak-hours. We propose an intelligent distributed dynamic pricing (D2P)
mechanism for the charging of PHEVs in a smart grid architecture -- an effort towards optimizing the energy
consumption profile of PHEVs users. Each micro-grid decides real-time dynamic price as home-price and
roaming-price, depending on the supply-demand curve, to optimize its revenue. Consequently, two types of energy
services are considered -- home micro-grid energy, and foreign microgrid energy. After designing the PHEVs' mobility
and battery models, the pricing policies for the home-price and the roamingprice are presented. A decision making
process to implement a cost-effective charging and discharging method for PHEVs is also demonstrated based on the
real-time price decided by the micro-grids. We evaluate and compare the results of distributed pricing policy with other
existing centralized/distributed ones. Simulation results show that using the proposed architecture, the utility
corresponding to the PHEVs increases by approximately 34% over that of the existing ones for optimal charging of
PHEVs.
M.E Computer Science Networking Projects
Title :D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
Language : NS2
Project Link : http://kasanpro.com/p/ns2/d2p-distributed-dynamic-pricing-policy-smart-grid-phevs-management-code
Abstract : Future large-scale deployment of plug-in hybrid electric vehicles (PHEVs) will render massive energy
demand on the electric grid during peak-hours. We propose an intelligent distributed dynamic pricing (D2P)
mechanism for the charging of PHEVs in a smart grid architecture -- an effort towards optimizing the energy
consumption profile of PHEVs users. Each micro-grid decides real-time dynamic price as home-price and
roaming-price, depending on the supply-demand curve, to optimize its revenue. Consequently, two types of energy
services are considered -- home micro-grid energy, and foreign microgrid energy. After designing the PHEVs' mobility
and battery models, the pricing policies for the home-price and the roamingprice are presented. A decision making
process to implement a cost-effective charging and discharging method for PHEVs is also demonstrated based on the
real-time price decided by the micro-grids. We evaluate and compare the results of distributed pricing policy with other
existing centralized/distributed ones. Simulation results show that using the proposed architecture, the utility
corresponding to the PHEVs increases by approximately 34% over that of the existing ones for optimal charging of
PHEVs.
Title :Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail

Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/retransmission-delays-with-bounded-packets-power-law-body-exponential-tail
Abstract : Retransmissions serve as the basic building block that communication protocols use to achieve reliable
data transfer. Until recently, the number of retransmissions was thought to follow a geometric (light-tailed) distribution.
However, recent work shows that when the distribution of the packet sizes have infinite support, retransmission-based
protocols may result in heavy-tailed delays and possibly zero throughput even when the aforementioned distribution is
light-tailed. In reality, however, packet sizes are often bounded by the maximum transmission unit (MTU), and thus
the aforementioned result merits a deeper investigation. To that end, in this paper, we allow the distribution of the
packet size to have finite support. Under mild conditions, we show that the transmission duration distribution exhibits
a transition from a power-law main body to an exponential tail. The timescale to observe the power-law main body is
roughly equal to the average transmission duration of the longest packet. The power-law main body, if significant,
may cause the channel throughput to be very close to zero. These theoretical findings provide an understanding on
why some empirical measurements suggest heavy tails. We use these results to further highlight the engineering
implications of distributions with power-law main bodies and light tails by analyzing two cases: 1) the throughput of
ON-OFF channels with retransmissions, where we show that even when packet sizes have small means and
bounded support the variability in their sizes can greatly impact system performance; 2) the distribution of the number
of jobs in an queue with server failures. Here, we show that retransmissions can cause long-range dependence and
quantify the impact of the maximum job sizes on the long-range dependence.
Title :Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/retransmission-delays-with-bounded-packets-power-law-body-exponential-tail-code
Abstract : Retransmissions serve as the basic building block that communication protocols use to achieve reliable
data transfer. Until recently, the number of retransmissions was thought to follow a geometric (light-tailed) distribution.
However, recent work shows that when the distribution of the packet sizes have infinite support, retransmission-based
protocols may result in heavy-tailed delays and possibly zero throughput even when the aforementioned distribution is
light-tailed. In reality, however, packet sizes are often bounded by the maximum transmission unit (MTU), and thus
the aforementioned result merits a deeper investigation. To that end, in this paper, we allow the distribution of the
packet size to have finite support. Under mild conditions, we show that the transmission duration distribution exhibits
a transition from a power-law main body to an exponential tail. The timescale to observe the power-law main body is
roughly equal to the average transmission duration of the longest packet. The power-law main body, if significant,
may cause the channel throughput to be very close to zero. These theoretical findings provide an understanding on
why some empirical measurements suggest heavy tails. We use these results to further highlight the engineering
implications of distributions with power-law main bodies and light tails by analyzing two cases: 1) the throughput of
ON-OFF channels with retransmissions, where we show that even when packet sizes have small means and
bounded support the variability in their sizes can greatly impact system performance; 2) the distribution of the number
of jobs in an queue with server failures. Here, we show that retransmissions can cause long-range dependence and
quantify the impact of the maximum job sizes on the long-range dependence.
Title :Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/secure-data-retrieval-decentralized-disruption-tolerant-military-networks
Abstract : Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from
intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are
becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and
access the confidential information or command reliably by exploiting external storage nodes. Some of the most
challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure
data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the
access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security
and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from
different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs
where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed
mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military
network.
Title :Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Language : NS2

Project Link :
http://kasanpro.com/p/ns2/secure-data-retrieval-decentralized-disruption-tolerant-military-networks-code
Abstract : Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from
intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are
becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and
access the confidential information or command reliably by exploiting external storage nodes. Some of the most
challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure
data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the
access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security
and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from
different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs
where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed
mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military
network.
M.E Computer Science Networking Projects

Vous aimerez peut-être aussi