ieee 2015 ns2 projects

Upload: karan

Post on 08-Oct-2015

14 views

Category:

Documents


0 download

DESCRIPTION

List of IEEE NS2 Projects. It Contains the IEEE Projects in the Language NS2 with ieee publication year 2015

TRANSCRIPT

  • IEEE 2015 NS2 ProjectsWeb : www.kasanpro.com Email : [email protected]

    List Link : http://kasanpro.com/projects-list/ieee-2015-ns2-projects

    Title :Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular NetworksLanguage : NS2Project Link : http://kasanpro.com/p/ns2/optimal-scheduling-multi-radio-multi-channel-cognitive-cellular-networksAbstract : Due to the emerging various data services, current cellular networks have been experiencing a surge ofdata traffic and already overloaded, thus not able to meet the ever exploding traffic demand. In this study, we firstintroduce a Multi-radio Multi-channel Multi-hop Cognitive Cellular Network (M3C2N) architecture to enhance networkthroughput. Under the proposed architecture, we then investigate the minimum length scheduling problem byexploring joint frequency allocation, link scheduling, and routing. In particular, we first formulate a maximalindependent set based joint scheduling and routing optimization problem called Original Optimization Problem (OOP).It is a Mixed Integer Non-Linear Programming (MINLP) and generally NP-hard problem. Then, employing a columngeneration based approach, we develop an ?-bounded approximation algorithm which can obtain an ?-boundedapproximate result of OOP. Noticeably, in fact we do not need to find all the maximal independent sets in theproposed algorithm, which are usually assumed to be given in previous works although finding all of them isNP-complete. We also revisit the minimum length scheduling problem by considering uncertain channel availability.Simulation results show that we can efficiently find the ?-bounded approximate results and the optimal result as well,i.e., when ? = 0% in the algorithm.

    Title :A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked SystemsLanguage : NS2Project Link : http://kasanpro.com/p/ns2/en-route-filtering-scheme-false-data-injection-attacks-cyber-physical-networked-systemsAbstract : In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements to thecontroller through compromised sensor nodes, which not only threaten the security of the system, but also consumesnetwork resources. To deal with this issue, a number of en-route filtering schemes have been designed for wirelesssensor networks in the past. However, these schemes either lack resilience to the number of compromised nodes ordepend on the statically configure routes and node localization, which are not suitable for CPNS. In this paper, wepropose a Polynomial-based Compromise-Resilient En-route Filtering scheme (PCREF), which can filter false injecteddata effectively and achieve a high resilience to the number of compromised nodes without relying on static routesand node localization. Particularly, PCREF adopts polynomials instead of MACs (Message Authentication Codes) forendorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials:authentication polynomial and check polynomial, derived from the primitive polynomial, and used for endorsing andverifying the measurement reports. Via extensive theoretical analysis and experiments, our data show that PCREFachieves better filtering capacity and resilience to the large number of compromised nodes in comparison to theexisting schemes.

    Title :Shared Authority Based Privacy-preserving Authentication Protocol in Cloud ComputingLanguage : NS2Project Link : http://kasanpro.com/p/ns2/privacy-preserving-authentication-protocol-shared-authority-cloudAbstract : Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotelystored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demandcloud applications without considering the local infrastructure limitations. During the data accessing, different usersmay be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. Theexisting security solutions mainly focus on the authentication to realize that a user's privative data cannot beunauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request otherusers for data sharing. The challenged access request itself may reveal the user's privacy no matter whether or not itcan obtain the data access permissions. In this paper, we propose a shared authority based privacy-preservingauthentication protocol (SAPA) to address above privacy issue for cloud storage. In the SAPA, 1) shared accessauthority is achieved by anonymous access request matching mechanism with security and privacy considerations(e.g., authentication, data anonymity, user privacy, and forward security); 2) attribute based access control is adoptedto realize that the user can only access its own data fields; 3) proxy re-encryption is applied by the cloud server toprovide data sharing among the multiple users. Meanwhile, universal composability (UC) model is established toprove that the SAPA theoretically has the design correctness. It indicates that the proposed protocol realizingprivacy-preserving data access authority sharing, is attractive for multi-user collaborative cloud applications.

    IEEE 2015 NS2 Projects

    Title :Efficient and Cost-Effective Hybrid Congestion Control for HPC Interconnection NetworksLanguage : NS2

  • Project Link : http://kasanpro.com/p/ns2/efficient-cost-effective-hybrid-congestion-controlAbstract : Interconnection networks are key components in high-performance computing (HPC) systems, theirperformance having a strong influence on the overall system one. However, at high load, congestion and its negativeeffects (e.g., Head-of-line blocking) threaten the performance of the network, and so the one of the entire system.Congestion control (CC) is crucial to ensure an efficient utilization of the interconnection network during congestionsituations. As one major trend is to reduce the effective wiring in interconnection networks to reduce cost and powerconsumption, the network will operate very close to its capacity. Thus, congestion control becomes essential. ExistingCC techniques can be divided into two general approaches. One is to throttle traffic injection at the sources thatcontribute to congestion, and the other is to isolate the congested traffic in specially designated resources. However,both approaches have different, but non-overlapping weaknesses: injection throttling techniques have a slow reactionagainst congestion, while isolating traffic in special resources may lead the system to run out of those resources. Inthis paper we propose EcoCC, a new Efficient and Cost-Effective CC technique, that combines injection throttling andcongested-flow isolation to minimize their respective drawbacks and maximize overall system performance. This newstrategy is suitable for current commercial switch architectures, where it could be implemented without requiringsignificant complexity. Experimental results, using simulations under synthetic and real trace-based traffic patterns,show that this technique improves by up to 55 percent over some of the most successful congestion controltechniques.

    Title :Joint Power Splitting and Antenna Selection in Energy Harvesting Relay ChannelsLanguage : NS2Project Link : http://kasanpro.com/p/ns2/joint-power-splitting-antenna-selectionAbstract : The simultaneous wireless transfer of information and power with the help of a relay equipped with multipleantennas is considered in this letter, where a "harvest-and-forward" strategy is proposed. In particular, the relayharvests energy and obtains information from the source with the radio-frequent signals by jointly using the antennaselection (AS) and power splitting (PS) techniques, and then the processed information is amplified and forwarded tothe destination relying on the harvested energy. This letter jointly optimizes AS and PS to maximize the achievablerate for the proposed strategy. Considering that the joint optimization is according to the non-convex problem, atwo-stage procedure is proposed to determine the optimal ratio of received signal power split for energy harvesting,and the optimized antenna set engaged in information forwarding. Simulation results confirm the accuracy of thetwo-stage procedure, and demonstrate that the proposed "harvest-and-forward" strategy outperforms theconventional amplify-and-forward (AF) relaying and the direct transmission.

    Title :Detectors for Cooperative Mesh Networks With Decode-and-Forward RelaysLanguage : NS2Project Link : http://kasanpro.com/p/ns2/detectors-cooperative-mesh-networks-with-decode-forward-relaysAbstract : We consider mesh networks composed of groups of relaying nodes which operate in decode-and-forwardmode. Each node from a group relays information to all the nodes in the next group. We study these networks in twosetups, one where the nodes have complete state information about the channels through which they receive thesignals, and anotherwhen they only have the statistics of the channels. We derive recursive expressions for theprobabilities of errors of the nodes and present several implementations of detectors used in these networks. Wecompare the mesh networks with multihop networks formed by a set of parallel sections of multiple relaying nodes.We demonstrate with numerous simulations that there are significant improvements in performance of mesh overmultihop networks in various scenarios.

    IEEE 2015 NS2 Projects