NS2 Wireless communication Titles
1 | Fundamental Storage-Latency Tradeoff in Cache-Aided MIMO Interference Networks | |
2 | Distributed Power Control Schemes in In-Band Full-Duplex Energy Harvesting Wireless Networks | |
3 | Joint Power Optimization for Device-to-Device Communication in Cellular Networks with Interference Control | |
4 | Interference Modeling for Cellular Networks under Beam forming Transmission | |
5 | Low-Complexity Link Adaptation for Energy Efficiency Maximization in MIMO-OFDM Systems | |
6 | Resource Allocation and Outage Analysis for An Adaptive Cognitive Two-Way Relay Network | |
7 | Energy-Efficient D2D Overlaying Communications with Spectrum-Power Trading | |
8 | Joint Rate Control and Scheduling for Real-Time Wireless Networks | |
9 | Application-Based Optimization of Multi-Level Clustering in ad hoc and Sensor Networks | |
10 | Dynamic Path To Stability in LTE-Unlicensed with User Mobility: A Matching Framework | |
11 | A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks | |
12 | On Using Dual Interfaces with Network Coding for Delivery Delay Reduction | |
13 | Dynamic Transmit Covariance Design in MIMO Fading Systems With Unknown Channel Distributions and Inaccurate Channel State Information | |
14 | Distributed Interference and Delay Aware Design for D2D Communication in Large Wireless Networks with Adaptive Interference Estimation | |
15 | Energy Efficient Transmission in Multi-User MIMO Relay Channels with Perfect and Imperfect Channel State Information | |
16 | A Stochastic Geometric Analysis of Device-to-Device Communications Operating over Generalized Fading Channels | |
17 | Group Cooperation with Optimal Resource Allocation in Wireless Powered Communication Networks | |
18 | An Approximation Algorithm for the Maximum-lifetime Data Aggregation Tree Problem in Wireless Sensor Networks | |
19 | On the Performance of Spatial Modulation MIMO for Full-Duplex Relay Networks | |
20 | D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System | |
21 | End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting | |
22 | Sum-Rate Analysis for Massive MIMO Downlink With Joint Statistical Beamforming and User Scheduling | |
23 | A Mixed Transmission Strategy to Achieve Energy Balancing in Wireless Sensor Networks | |
24 | Interference Efficiency: A New Metric to Analyze the Performance of Cognitive Radio Networks | |
25 | Velocity-Aware Handover Management in Two-Tier Cellular Networks | |
26 | Simultaneous Wireless Transfer of Power and Information in a Decode-and-Forward Two-Way Relaying Network | |
27 | E2HRC- An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks | |
28 | A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks | |
30 | Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSN | |
31 | Optimization of Watchdog Selection in Wireless Sensor Networks | |
32 | Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks | |
33 | Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks | |
34 | Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks |
NS2 NETWORKING PROJECTS
1 | An Overlay Architecture for Throughput Optimal Multipath Routing | |
2 | A Scalable Framework for Wireless Distributed Computing | |
3 | Routing in Accumulative Multi-Hop Networks | |
4 | Coding for Improved Throughput Performance in Network Switches | |
5 | A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks | |
6 | Connectivity Analysis in Wireless Networks With Correlated Mobility and Cluster Scalability | |
7 | Diversity Coding in Two-Connected Networks | |
8 | User-Centric Network MIMO With Dynamic Clustering | |
9 | Multicast in Multihop CRNs Under Uncertain Spectrum Availability: A Network Coding Approach | |
10 | Deterministic Broadcasting and Random Linear Network Coding in Mobile Ad Hoc Networks | |
12 | Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks | |
13 | Toward Cooperation by Carrier Aggregation in Heterogeneous Networks A Hierarchical Game Approach | |
14 | Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks | |
15 | End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting | |
16 | Maximizing Spectral Efficiency for Energy Harvesting-Aware WBAN | |
17 | Opportunistic Shortcut Tree Routing in ZigBee Networks | |
18 | Performance Optimization of CSMA Networks with a Finite Retry Limit | |
19 | Video Packet Scheduling with Stochastic QoS for Cognitive Heterogeneous Networks |
DEPENDABLE AND SECURE COMPUTING PROJECTS
1 | Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic | |
2 | Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks | |
3 | Fault-Tolerant Adaptive Routing in Dragonfly Networks | |
4 | Optimal Spot-Checking for Collusion Tolerance in Computer Grids |
NS2 MOBILE COMPUTING PROJECTS
1 | Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy | |
2 | Energy-Efficient and Distributed Network Management Cost Minimization in Opportunistic Wireless Body Area Networks | |
3 | Stability and Dynamic Control of Underlay Mobile Edge Networks | |
4 | Secure MAC: Securing Wireless Medium Access Control Against Insider Denial-of- Service Attacks | |
5 | Improving Throughput and Fairness of Converge cast in Vehicular Networks | |
6 | Quality-Aware Traffic Offloading in Wireless Networks | |
7 | Mode Selection and Resource Allocation in Device-to-Device Communications: A Matching Game Approach | |
8 | Optimal Scheduling for Interference Mitigation by Range Information |
MANET:
1 | Adaptive Rerouting to Avoid Local Congestion in MANETs | |
2 | CRCMD&R: Cluster and Reputation based cooperative malicious node Detection & Removal scheme in MANETs | |
3 | EPPN: Extended Prime Product Number based wormhole DETECTION scheme for MANETs | |
4 | Lightweight authentication-based scheme for AODV in ad-hoc networks | |
5 | Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography |
VANET:
1 | REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET | |
2 | Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs | |
3 | Distributed Aggregate Privacy-Preserving Authentication in VANETs | |
4 | EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Network | |
5 | GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs | |
6 | MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs |