SlideShare ist ein Scribd-Unternehmen logo
1 von 14
IEEE 2012 NS2 Titles & Abstract

       FOR REGISTER: www.finalyearstudentsproject.com

                 CONTACT NO.: 91-9176696486.

     Address: No.73, karuneegar street, Adambakkam, Chennai-88




NS2 PROJECTS 2012



  1. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
     Sinks – projects 2012



     ABSTRACT



     Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications
     for efficient data accumulation, localized sensor reprogramming, and for
     distinguishing and revoking compromised sensors. However, in sensor networks
     that make use of the existing key predistribution schemes for pairwise key
     establishment and authentication between sensor nodes and mobile sinks, the
     employment of mobile sinks for data collection elevates a new security challenge:
     in the basic probabilistic and q-composite key predistribution schemes, an
     attacker can easily obtain a large number of keys by capturing a small fraction of
     nodes, and hence, can gain control of the network by deploying a replicated
     mobile sink preloaded with some compromised keys. This article describes a
     three-tier general framework that permits the use of any pairwise key
     predistribution scheme as its basic component. The new framework requires two
     separate key pools, one for the mobile sink to access the network, and one for
     pairwise key establishment between the sensors. To further reduce the damages
     caused by stationary access node replication attacks, we have strengthened the
     authentication mechanism between the sensor and the stationary access node in
     the proposed framework. Through detailed analysis, we show that our security
IEEE 2012 NS2 Titles & Abstract

     FOR REGISTER: www.finalyearstudentsproject.com

               CONTACT NO.: 91-9176696486.

   Address: No.73, karuneegar street, Adambakkam, Chennai-88




   framework has a higher network resilience to a mobile sink replication attack as
   compared to the polynomial pool-based scheme.




2. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks –
   projects 2012



   ABSTRACT:



   Ad-hoc networks are becoming an effective tool for many mission critical
   applications such as troop coordination in a combat field, situational awareness,
   etc. These applications are characterized by the hostile environment that they
   serve in and by the multicast-style of communication traffic. Therefore,
   authenticating the source and ensuring the integrity of the message traffic
   become a fundamental requirement for the operation and management of the
   network. However, the limited computation and communication resources, the
   large scale deployment and the unguaranteed connectivity to trusted authorities
   make known solutions for wired and single-hop wireless networks inappropriate.
   This paper presents a new Tiered Authentication scheme for Multicast traffic
   (TAM) for large scale dense ad-hoc networks. TAM combines the advantages of
   the time asymmetry and the secret information asymmetry paradigms and
   exploits network clustering to reduce overhead and ensure scalability. Multicast
   traffic within a cluster employs a one-way hash function chain in order to
   authenticate the message source. Cross-cluster multicast traffic includes
   message authentication codes (MACs) that are based on a set of keys. Each
IEEE 2012 NS2 Titles & Abstract

    FOR REGISTER: www.finalyearstudentsproject.com

              CONTACT NO.: 91-9176696486.

  Address: No.73, karuneegar street, Adambakkam, Chennai-88




  cluster uses a unique subset of keys to look for its distinct combination of valid
  MACs in the message in order to authenticate the source. The simulation and
  analytical results demonstrate the performance advantage of TAM in terms of
  bandwidth overhead and delivery delay




3. Design and Implementation of TARF: A Trust-Aware Routing Framework for
  WSNs- projects 2012




  ABSTRACT:



  The multihop routing in wireless sensor networks (WSNs) offers little protection
  against identity deception through replaying routing information. An adversary
  can exploit this defect to launch various harmful or even devastating attacks
  against the routing protocols, including sinkhole attacks, wormhole attacks, and
  Sybil attacks. The situation is further aggravated by mobile and harsh network
  conditions. Traditional cryptographic techniques or efforts at developing trust-
  aware routing protocols do not effectively address this severe problem. To
  secure the WSNs against adversaries misdirecting the multihop routing, we have
  designed and implemented TARF, a robust trust-aware routing framework for
  dynamic WSNs. Without tight time synchronization or known geographic
  information, TARF provides trustworthy and energy-efficient route. Most
  importantly, TARF proves effective against those harmful attacks developed out
  of identity deception; the resilience of TARF is verified through extensive
  evaluation with both simulation and empirical experiments on large-scale WSNs
IEEE 2012 NS2 Titles & Abstract

    FOR REGISTER: www.finalyearstudentsproject.com

              CONTACT NO.: 91-9176696486.

  Address: No.73, karuneegar street, Adambakkam, Chennai-88




  under various scenarios including mobile and RF-shielding network conditions.
  Further, we have implemented a low-overhead TARF module in TinyOS; as
  demonstrated, this implementation can be incorporated into existing routing
  protocols with the least effort. Based on TARF, we also demonstrated a proof-of-
  concept mobile target detection application that functions well against an
  antidetection mechanism.




4. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation
  in Wireless Sensor Networks Using Sequential Hypothesis Testing-
  projects 2012



  ABSTRACT:

  Due to the unattended nature of wireless sensor networks, an adversary can
  physically capture and compromise sensor nodes and then mount a variety of
  attacks with the compromised nodes. To minimize the damage incurred by the
  compromised nodes, the system should detect and revoke them as soon as
  possible. To meet this need, researchers have recently proposed a variety of
  node compromise detection schemes in wireless ad hoc and sensor networks.
  For example, reputation-based trust management schemes identify malicious
  nodes but do not revoke them due to the risk of false positives. Similarly,
  software-attestation schemes detect the subverted software modules of
  compromised nodes. However, they require each sensor node to be attested
  periodically, thus incurring substantial overhead. To mitigate the limitations of the
  existing schemes, we propose a zone-based node compromise detection and
  revocation scheme in wireless sensor networks. The main idea behind our
  scheme is to use sequential hypothesis testing to detect suspect regions in which
  compromised nodes are likely placed. In these suspect regions, the network
IEEE 2012 NS2 Titles & Abstract

     FOR REGISTER: www.finalyearstudentsproject.com

               CONTACT NO.: 91-9176696486.

   Address: No.73, karuneegar street, Adambakkam, Chennai-88




   operator performs software attestation against sensor nodes, leading to the
   detection and revocation of the compromised nodes. Through quantitative
   analysis and simulation experiments, we show that the proposed scheme detects
   the compromised nodes with a small number of samples while reducing false
   positive and negative rates, even if a substantial fraction of the nodes in the zone
   are compromised. Additionally, we model the detection problem using a game
   theoretic analysis, derive the optimal strategies for the attacker and the defender,
   and show that the attacker’s gain from node compromise is greatly limited by the
   defender when both the attacker and the defender follow their optimal strategies.




5. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network-
   Mobile Computing, projects 2012



   ABSTRACT



   In a mobile ad hoc network, the mobility and resource constraints of mobile
   nodes may lead to network partitioning or performance degradation. Several data
   replication techniques have been proposed to minimize performance
   degradation. Most of them assume that all mobile nodes collaborate fully in terms
   of sharing their memory space. In reality, however, some nodes may selfishly
   decide only to cooperate partially, or not at all, with other nodes. These selfish
   nodes could then reduce the overall data accessibility in the network. In this
   paper, we examine the impact of selfish nodes in a mobile ad hoc network from
   the perspective of replica allocation. We term this selfish replica allocation. In
   particular, we develop a selfish node detection algorithm that considers partial
   selfishness and novel replica allocation techniques to properly cope with selfish
IEEE 2012 NS2 Titles & Abstract

          FOR REGISTER: www.finalyearstudentsproject.com

                    CONTACT NO.: 91-9176696486.

        Address: No.73, karuneegar street, Adambakkam, Chennai-88




        replica allocation. The conducted simulations demonstrate the proposed
        approach outperforms traditional cooperative replica allocation techniques in
        terms of data accessibility, communication cost, and average query delay.




   6.   Cut Detection in Wireless Sensor Networks – projects 2012

ABSTRACT:

A wireless sensor network can get separated into multiple connected components due
to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the
problem of detecting cuts by the remaining nodes of a wireless sensor network. We
propose an algorithm that allows 1) every node to detect when the connectivity to a
specially designated node has been lost, and 2) one or more nodes (that are connected
to the special node after the cut) to detect the occurrence of the cut. The algorithm is
distributed and asynchronous: every node needs to communicate with only those nodes
that are within its communication range. The algorithm is based on the iterative
computation of a fictitious “electrical potential” of the nodes. The convergence rate of
the underlying iterative scheme is independent of the size and structure of the network.
We demonstrate the effectiveness of the proposed algorithm through simulations and a
real hardware implementation.
IEEE 2012 NS2 Titles & Abstract

         FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




   7. fast Data Collection in Tree-Based Wireless Sensor Networks- Mobile
      Computing, projects 2012

Abstract:Fast Data Collection in Tree-Based Wireless Sensor Networks

We investigate the following fundamental question – how fast can information be
collected from a wireless sensor network organized as tree? To address this, we
explore and evaluate a number of different techniques using realistic simulation models
under the many-to-one communication paradigm known as convergecast. We first
consider time scheduling on a single frequency channel with the aim of minimizing the
number of time slots required (schedule length) to complete a convergecast. Next, we
combine scheduling with transmission power control to mitigate the effects of
interference, and show that while power control helps in reducing the schedule length
under a single frequency, scheduling transmissions using multiple frequencies is more
efficient. We give lower bounds on the schedule length when interference is completely
eliminated, and propose algorithms that achieve these bounds. We also evaluate the
performance of various channel assignment methods and find empirically that for
moderate size networks of about 100 nodes, the use of multi-frequency scheduling can
suffice to eliminate most of the interference. Then, the data collection rate no longer
remains limited by interference but by the topology of the routing tree. To this end, we
construct degree-constrained spanning trees and capacitated minimal spanning trees,
and show significant improvement in scheduling performance over different deployment
densities. Lastly, we evaluate the impact of different interference and channel models
on the schedule length.
IEEE 2012 NS2 Titles & Abstract

         FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




   8. Hop-by-Hop      Routing    in   Wireless   Mesh    Networks     with   Bandwidth
      Guarantees- Mobile Computing, projects 2012

      Abstract:

   Wireless Mesh Network (WMN) has become an important edge network to provide
Internet access to remote areas and wireless connections in a metropolitan scale. In
this paper, we study the problem of identifying the maximum available bandwidth path,
a fundamental issue in supporting quality-of-service in WMNs. Due to interference
among links, bandwidth, a well-known bottleneck metric in wired networks, is neither
concave nor additive in wireless networks. We propose a new path weight which
captures the available path bandwidth information. We formally prove that our hop-by-
hop routing protocol based on the new path weight satisfies the consistency and loop-
freeness requirements. The consistency property guarantees that each node makes a
proper packet forwarding decision, so that a data packet does traverse over the
intended path. Our extensive simulation experiments also show that our proposed path
weight outperforms existing path metrics in identifying high-throughput paths.

Wireless Mesh Network (WMN) has become an important edge network to provide
Internet access to remote areas and wireless connections in a metropolitan scale. In
this paper, we study the problem of identifying the maximum available bandwidth path,
a fundamental issue in supporting quality-of-service in WMNs. Due to interference
among links, bandwidth, a well-known bottleneck metric in wired networks, is neither
concave nor additive in wireless networks. We propose a new path weight which
captures the available path bandwidth information. We formally prove that our hop-by-
hop routing protocol based on the new path weight satisfies the consistency and loop-
freeness requirements. The consistency property guarantees that each node makes a
IEEE 2012 NS2 Titles & Abstract

         FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




proper packet forwarding decision, so that a data packet does traverse over the
intended path. Our extensive simulation experiments also show that our proposed path
weight outperforms existing path metrics in identifying high-throughput paths.




   9. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc
      Networks- Mobile Computing, projects 2012

   Abstract:Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc
   Networks

This paper addresses the problem of delivering data packets for highly dynamic mobile
ad hoc networks in a reliable and timely manner. Most existing ad hoc routing protocols
are susceptible to node mobility, especially for large-scale networks. Driven by this
issue, we propose an efficient Position-based Opportunistic Routing (POR) protocol
which takes advantage of the stateless property of geographic routing and the
broadcast nature of wireless medium. When a data packet is sent out, some of the
neighbor nodes that have overheard the transmission will serve as forwarding
candidates, and take turn to forward the packet if it is not relayed by the specific best
forwarder within a certain period of time. By utilizing such in-the-air backup,
communication is maintained without being interrupted. The additional latency incurred
by local route recovery is greatly reduced and the duplicate relaying caused by packet
reroute is also decreased. In the case of communication hole, a Virtual Destination-
based Void Handling (VDVH) scheme is further proposed to work together with POR.
Both theoretical analysis and simulation results show that POR achieves excellent
IEEE 2012 NS2 Titles & Abstract

         FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

       Address: No.73, karuneegar street, Adambakkam, Chennai-88




performance even under high node mobility with acceptable overhead and the new void
handling scheme also works well

   10. Minimizing Delay And Maximizing Lifetime For Wireless Sensor Networks With
       Any Cast


ABSTRACT:

In this paper, we are interested in minimizing the delay and maximizing the lifetime of
event-driven wireless sensor networks for which events occur infrequently. In such
systems, most of the energy is consumed when the radios are on, waiting for a packet
to arrive. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of
these energy-constrained wireless sensor networks. However, sleep-wake scheduling
could result in substantial delays because a transmitting node needs to wait for its next-
hop relay node to wake up. An interesting line of work attempts to reduce these delays
by developing ¿anycast¿-based packet forwarding schemes, where each node
opportunistically forwards a packet to the first neighboring node that wakes up among
multiple candidate nodes. In this paper, we first study how to optimize the anycast
forwarding schemes for minimizing the expected packet-delivery delays from the sensor
nodes to the sink. Based on this result, we then provide a solution to the joint control
problem of how to optimally control the system parameters of the sleep-wake
scheduling protocol and the anycast packet-forwarding protocol to maximize the
network lifetime, subject to a constraint on the expected end-to-end packet-delivery
delay. Our numerical results indicate that the proposed solution can outperform prior
heuristic solutions in the literature, especially under practical scenarios where there are
obstructions, e.g., a lake or a mountain, in the coverage area of the wireless sensor
network.
IEEE 2012 NS2 Titles & Abstract

        FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




   11. Optimize Storage Placement In Sensor Networks


ABSTRACT:
Data storage has become an important issue in sensor networks as a large amount of
     collected data need to be archived for future information retrieval. Storage nodes
     are introduced in this paper to store the data collected from the sensors in their
     proximities. The storage nodes alleviate the heavy load of transmitting all data to a
     central place for archiving and reduce the communication cost induced by the
     network query. The objective of this paper is to address the storage node
     placement problem aiming to minimize the total energy cost for gathering data to
     the storage nodes and replying queries. We examine deterministic placement of
     storage nodes and present optimal algorithms based on dynamic programming.
     Further, we give stochastic analysis for random deployment and conduct
     simulation evaluation for both deterministic and random placements of storage
     nodes.




   12. Secure Data Collection In Wireless Sensor Networks Using Randomized
      Dispersive Routes
IEEE 2012 NS2 Titles & Abstract

     FOR REGISTER: www.finalyearstudentsproject.com

               CONTACT NO.: 91-9176696486.

   Address: No.73, karuneegar street, Adambakkam, Chennai-88




   Compromised-node and denial-of-service are two key attacks in wireless sensor
   networks (WSNs). In this paper, we study routing mechanisms that circumvent
   (bypass) black holes formed by these attacks. We argue that existing multi-path
   routing approaches are vulnerable to such attacks, mainly due to their
   deterministic nature. So once an adversary acquires the routing algorithm, it can
   compute the same routes known to the source, and hence endanger all
   information sent over these routes. In this paper, we develop mechanisms that
   generate randomized multipath routes. Under our design, the routes taken by the
   “shares” of different packets change over time. So even if the routing
   algorithm becomes known to the adversary, the adversary still cannot pinpoint
   the routes traversed by each packet. Besides randomness, the routes generated
   by our mechanisms are also highly dispersive and energy-efficient, making them
   quite capable of bypassing black holes at low energy cost. Extensive simulations
   are conducted to verify the validity of our mechanisms.



13. Performance Modeling of Message Dissemination In Vehicular Ad Hoc Networks
    with Priority



ABSTRACT:

In this paper, we present an analytical study for the performance of message
dissemination in vehicular ad hoc networks (VANETs) with two priority classes. It
is assumed that the message traffic generated by event-driven safety
applications has higher priority compared to the remaining network traffic. First,
we derive the distribution of the number of concurrent transmissions of lower
priority messages in the system at the steady state, through a birth-death
process analysis. The distribution has a simple product form solution. We also
derive the percentage of destination node population which cannot receive the
message error free due to interference. Subsequently, we determine the
IEEE 2012 NS2 Titles & Abstract

        FOR REGISTER: www.finalyearstudentsproject.com

                 CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




   average forwarding distance and the number of nodes which receive a high-
   priority message in the presence of low-priority traffic. Numerical results are
   provided along with simulation results that confirm the accuracy of the proposed
   analysis. The distribution of the number of concurrent transmissions is shown to
   have a bell-shape curve. Results also show that larger transmission ranges do
   not necessarily improve the per hop safety-message forwarding distance as
   more nodes may be exposed to interference, especially in networks with higher
   node densities.



   14. An Attribute-Based Access Control System for Emergency Services over
       Vehicular Ad Hoc Networks


ABSTRACT
In this paper, we propose an Attribute-Based Access Control System (ABACS) for
emergency services with security assurance over Vehicular Ad Hoc Networks
(VANETs). ABACS aims to improve the efficiency of rescues mobilized via
emergency communications over VANETs. By adopting fuzzy identity-based
encryption, ABACS can select the emergency vehicles that can most appropriately
deal with an emergency and securely delegate the authority to control traffic
facilities to the assigned emergency vehicles. Using novel cryptographic
preliminaries, ABACS realizes confidentiality of messages, prevention of collusion
attacks, and fine-grained access control. As compared to the current PKI scheme,
the computational delay and transmission overhead can be reduced by exploiting
the advantages afforded by message broadcasting, which is heavily used in ABACS.
The performance evaluation demonstrates that ABACS is a suitable candidate for
realizing emergency services via VANETs.
IEEE 2012 NS2 Titles & Abstract

         FOR REGISTER: www.finalyearstudentsproject.com

                   CONTACT NO.: 91-9176696486.

      Address: No.73, karuneegar street, Adambakkam, Chennai-88




   15. Delaying Transmissions in Data Communication Networks to Improve
       Transport-Layer Performance


ABSTRACT
Packet losses in the network have a considerable performance impact on transport-
layer throughput. For reliabledata transfer, lost packets require retransmissions and
thus cause very long delays. This tail of the packet delaydistribution
causes performance problems. There are several approaches to trading
off networking resources up-front to reduce long delays for some packets (e.g., forward
error correction, network coding). We propose packet pacing as an alternative that
changes traffic characteristics favorably by adding
intentional delay inpacket transmissions. This intentional delay counters the principle of
best effort but can reduce the burstiness of traffic and improve overall network operation
- in particular in network with small packet buffers. As a result,
pacing improves transport-layer performance, providing a tradeoff example where small
amounts of additionaldelay can significantly increase connection bandwidth. We present
a Queue Length Based Pacing (QLBP) algorithm that paces network traffic using a
single queue and that can be implemented with small computational and memory
overhead. We present a detailed analysis on delay bounds and the quantitative impact
of QLBP pacing on network traffic. Through simulation, we show how the proposed
pacing technique can improveconnection throughput in small-buffer networks.

Weitere ähnliche Inhalte

Andere mochten auch

2013 수원시 학교사회복지사업 사례집
2013 수원시 학교사회복지사업 사례집2013 수원시 학교사회복지사업 사례집
2013 수원시 학교사회복지사업 사례집Woong Choi
 
Beyoncé - slide presentation
Beyoncé - slide presentationBeyoncé - slide presentation
Beyoncé - slide presentationThamys
 
Estrategias competitivas básicas
Estrategias competitivas básicasEstrategias competitivas básicas
Estrategias competitivas básicasLarryJimenez
 
5. medidas descriptivas (datos agrupados)
5. medidas  descriptivas (datos agrupados)5. medidas  descriptivas (datos agrupados)
5. medidas descriptivas (datos agrupados)Javier Coronado
 
Contabilidad Financiera
Contabilidad FinancieraContabilidad Financiera
Contabilidad Financieraalejandrocl
 
obras que pueden ser representadas
obras que pueden ser representadasobras que pueden ser representadas
obras que pueden ser representadasyenni montaña
 
Rojas ingrid 22981003 trabajo de base de datos
Rojas ingrid 22981003 trabajo de base de datosRojas ingrid 22981003 trabajo de base de datos
Rojas ingrid 22981003 trabajo de base de datosIUTAC BARINAS
 
Todo sobre perfilagem
Todo sobre perfilagemTodo sobre perfilagem
Todo sobre perfilagemFranklin Lima
 
Produccion y comercializacion de porcinos - Diseño de Proyectos UNAD
Produccion y comercializacion de porcinos - Diseño de Proyectos UNADProduccion y comercializacion de porcinos - Diseño de Proyectos UNAD
Produccion y comercializacion de porcinos - Diseño de Proyectos UNADnino_2105
 
Anonimato em Evidência
Anonimato em EvidênciaAnonimato em Evidência
Anonimato em Evidênciaoliviahamada
 

Andere mochten auch (20)

2013 수원시 학교사회복지사업 사례집
2013 수원시 학교사회복지사업 사례집2013 수원시 학교사회복지사업 사례집
2013 수원시 학교사회복지사업 사례집
 
Acupuntura estrias07
Acupuntura estrias07Acupuntura estrias07
Acupuntura estrias07
 
Tank
TankTank
Tank
 
Evidencias 2013
Evidencias 2013Evidencias 2013
Evidencias 2013
 
Beyoncé - slide presentation
Beyoncé - slide presentationBeyoncé - slide presentation
Beyoncé - slide presentation
 
Makers of the Web
Makers of the WebMakers of the Web
Makers of the Web
 
Estrategias competitivas básicas
Estrategias competitivas básicasEstrategias competitivas básicas
Estrategias competitivas básicas
 
Conceptos eléctricos
Conceptos eléctricosConceptos eléctricos
Conceptos eléctricos
 
5. medidas descriptivas (datos agrupados)
5. medidas  descriptivas (datos agrupados)5. medidas  descriptivas (datos agrupados)
5. medidas descriptivas (datos agrupados)
 
Definición de la química aplicada
Definición de la química aplicadaDefinición de la química aplicada
Definición de la química aplicada
 
Estrategias de desarrollo de equipos APS
Estrategias de desarrollo de equipos APSEstrategias de desarrollo de equipos APS
Estrategias de desarrollo de equipos APS
 
Contabilidad Financiera
Contabilidad FinancieraContabilidad Financiera
Contabilidad Financiera
 
Distimia y ciclotimia
Distimia y ciclotimiaDistimia y ciclotimia
Distimia y ciclotimia
 
obras que pueden ser representadas
obras que pueden ser representadasobras que pueden ser representadas
obras que pueden ser representadas
 
SilvaMarcioWagnerda
SilvaMarcioWagnerdaSilvaMarcioWagnerda
SilvaMarcioWagnerda
 
Rojas ingrid 22981003 trabajo de base de datos
Rojas ingrid 22981003 trabajo de base de datosRojas ingrid 22981003 trabajo de base de datos
Rojas ingrid 22981003 trabajo de base de datos
 
Todo sobre perfilagem
Todo sobre perfilagemTodo sobre perfilagem
Todo sobre perfilagem
 
Produccion y comercializacion de porcinos - Diseño de Proyectos UNAD
Produccion y comercializacion de porcinos - Diseño de Proyectos UNADProduccion y comercializacion de porcinos - Diseño de Proyectos UNAD
Produccion y comercializacion de porcinos - Diseño de Proyectos UNAD
 
Manuela kaue leito fixo
Manuela kaue leito fixoManuela kaue leito fixo
Manuela kaue leito fixo
 
Anonimato em Evidência
Anonimato em EvidênciaAnonimato em Evidência
Anonimato em Evidência
 

Ns2 IEEE 2012 Titles

  • 1. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 NS2 PROJECTS 2012 1. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks – projects 2012 ABSTRACT Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security
  • 2. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme. 2. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks – projects 2012 ABSTRACT: Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. However, the limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known solutions for wired and single-hop wireless networks inappropriate. This paper presents a new Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. TAM combines the advantages of the time asymmetry and the secret information asymmetry paradigms and exploits network clustering to reduce overhead and ensure scalability. Multicast traffic within a cluster employs a one-way hash function chain in order to authenticate the message source. Cross-cluster multicast traffic includes message authentication codes (MACs) that are based on a set of keys. Each
  • 3. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 cluster uses a unique subset of keys to look for its distinct combination of valid MACs in the message in order to authenticate the source. The simulation and analytical results demonstrate the performance advantage of TAM in terms of bandwidth overhead and delivery delay 3. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs- projects 2012 ABSTRACT: The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust- aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs
  • 4. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of- concept mobile target detection application that functions well against an antidetection mechanism. 4. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing- projects 2012 ABSTRACT: Due to the unattended nature of wireless sensor networks, an adversary can physically capture and compromise sensor nodes and then mount a variety of attacks with the compromised nodes. To minimize the damage incurred by the compromised nodes, the system should detect and revoke them as soon as possible. To meet this need, researchers have recently proposed a variety of node compromise detection schemes in wireless ad hoc and sensor networks. For example, reputation-based trust management schemes identify malicious nodes but do not revoke them due to the risk of false positives. Similarly, software-attestation schemes detect the subverted software modules of compromised nodes. However, they require each sensor node to be attested periodically, thus incurring substantial overhead. To mitigate the limitations of the existing schemes, we propose a zone-based node compromise detection and revocation scheme in wireless sensor networks. The main idea behind our scheme is to use sequential hypothesis testing to detect suspect regions in which compromised nodes are likely placed. In these suspect regions, the network
  • 5. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 operator performs software attestation against sensor nodes, leading to the detection and revocation of the compromised nodes. Through quantitative analysis and simulation experiments, we show that the proposed scheme detects the compromised nodes with a small number of samples while reducing false positive and negative rates, even if a substantial fraction of the nodes in the zone are compromised. Additionally, we model the detection problem using a game theoretic analysis, derive the optimal strategies for the attacker and the defender, and show that the attacker’s gain from node compromise is greatly limited by the defender when both the attacker and the defender follow their optimal strategies. 5. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network- Mobile Computing, projects 2012 ABSTRACT In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this paper, we examine the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. We term this selfish replica allocation. In particular, we develop a selfish node detection algorithm that considers partial selfishness and novel replica allocation techniques to properly cope with selfish
  • 6. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 replica allocation. The conducted simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query delay. 6. Cut Detection in Wireless Sensor Networks – projects 2012 ABSTRACT: A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. We demonstrate the effectiveness of the proposed algorithm through simulations and a real hardware implementation.
  • 7. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 7. fast Data Collection in Tree-Based Wireless Sensor Networks- Mobile Computing, projects 2012 Abstract:Fast Data Collection in Tree-Based Wireless Sensor Networks We investigate the following fundamental question – how fast can information be collected from a wireless sensor network organized as tree? To address this, we explore and evaluate a number of different techniques using realistic simulation models under the many-to-one communication paradigm known as convergecast. We first consider time scheduling on a single frequency channel with the aim of minimizing the number of time slots required (schedule length) to complete a convergecast. Next, we combine scheduling with transmission power control to mitigate the effects of interference, and show that while power control helps in reducing the schedule length under a single frequency, scheduling transmissions using multiple frequencies is more efficient. We give lower bounds on the schedule length when interference is completely eliminated, and propose algorithms that achieve these bounds. We also evaluate the performance of various channel assignment methods and find empirically that for moderate size networks of about 100 nodes, the use of multi-frequency scheduling can suffice to eliminate most of the interference. Then, the data collection rate no longer remains limited by interference but by the topology of the routing tree. To this end, we construct degree-constrained spanning trees and capacitated minimal spanning trees, and show significant improvement in scheduling performance over different deployment densities. Lastly, we evaluate the impact of different interference and channel models on the schedule length.
  • 8. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 8. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees- Mobile Computing, projects 2012 Abstract: Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth information. We formally prove that our hop-by- hop routing protocol based on the new path weight satisfies the consistency and loop- freeness requirements. The consistency property guarantees that each node makes a proper packet forwarding decision, so that a data packet does traverse over the intended path. Our extensive simulation experiments also show that our proposed path weight outperforms existing path metrics in identifying high-throughput paths. Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth information. We formally prove that our hop-by- hop routing protocol based on the new path weight satisfies the consistency and loop- freeness requirements. The consistency property guarantees that each node makes a
  • 9. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 proper packet forwarding decision, so that a data packet does traverse over the intended path. Our extensive simulation experiments also show that our proposed path weight outperforms existing path metrics in identifying high-throughput paths. 9. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks- Mobile Computing, projects 2012 Abstract:Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. Driven by this issue, we propose an efficient Position-based Opportunistic Routing (POR) protocol which takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. When a data packet is sent out, some of the neighbor nodes that have overheard the transmission will serve as forwarding candidates, and take turn to forward the packet if it is not relayed by the specific best forwarder within a certain period of time. By utilizing such in-the-air backup, communication is maintained without being interrupted. The additional latency incurred by local route recovery is greatly reduced and the duplicate relaying caused by packet reroute is also decreased. In the case of communication hole, a Virtual Destination- based Void Handling (VDVH) scheme is further proposed to work together with POR. Both theoretical analysis and simulation results show that POR achieves excellent
  • 10. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 performance even under high node mobility with acceptable overhead and the new void handling scheme also works well 10. Minimizing Delay And Maximizing Lifetime For Wireless Sensor Networks With Any Cast ABSTRACT: In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks for which events occur infrequently. In such systems, most of the energy is consumed when the radios are on, waiting for a packet to arrive. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of these energy-constrained wireless sensor networks. However, sleep-wake scheduling could result in substantial delays because a transmitting node needs to wait for its next- hop relay node to wake up. An interesting line of work attempts to reduce these delays by developing ¿anycast¿-based packet forwarding schemes, where each node opportunistically forwards a packet to the first neighboring node that wakes up among multiple candidate nodes. In this paper, we first study how to optimize the anycast forwarding schemes for minimizing the expected packet-delivery delays from the sensor nodes to the sink. Based on this result, we then provide a solution to the joint control problem of how to optimally control the system parameters of the sleep-wake scheduling protocol and the anycast packet-forwarding protocol to maximize the network lifetime, subject to a constraint on the expected end-to-end packet-delivery delay. Our numerical results indicate that the proposed solution can outperform prior heuristic solutions in the literature, especially under practical scenarios where there are obstructions, e.g., a lake or a mountain, in the coverage area of the wireless sensor network.
  • 11. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 11. Optimize Storage Placement In Sensor Networks ABSTRACT: Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. Storage nodes are introduced in this paper to store the data collected from the sensors in their proximities. The storage nodes alleviate the heavy load of transmitting all data to a central place for archiving and reduce the communication cost induced by the network query. The objective of this paper is to address the storage node placement problem aiming to minimize the total energy cost for gathering data to the storage nodes and replying queries. We examine deterministic placement of storage nodes and present optimal algorithms based on dynamic programming. Further, we give stochastic analysis for random deployment and conduct simulation evaluation for both deterministic and random placements of storage nodes. 12. Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes
  • 12. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multipath routes. Under our design, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms. 13. Performance Modeling of Message Dissemination In Vehicular Ad Hoc Networks with Priority ABSTRACT: In this paper, we present an analytical study for the performance of message dissemination in vehicular ad hoc networks (VANETs) with two priority classes. It is assumed that the message traffic generated by event-driven safety applications has higher priority compared to the remaining network traffic. First, we derive the distribution of the number of concurrent transmissions of lower priority messages in the system at the steady state, through a birth-death process analysis. The distribution has a simple product form solution. We also derive the percentage of destination node population which cannot receive the message error free due to interference. Subsequently, we determine the
  • 13. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 average forwarding distance and the number of nodes which receive a high- priority message in the presence of low-priority traffic. Numerical results are provided along with simulation results that confirm the accuracy of the proposed analysis. The distribution of the number of concurrent transmissions is shown to have a bell-shape curve. Results also show that larger transmission ranges do not necessarily improve the per hop safety-message forwarding distance as more nodes may be exposed to interference, especially in networks with higher node densities. 14. An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks ABSTRACT In this paper, we propose an Attribute-Based Access Control System (ABACS) for emergency services with security assurance over Vehicular Ad Hoc Networks (VANETs). ABACS aims to improve the efficiency of rescues mobilized via emergency communications over VANETs. By adopting fuzzy identity-based encryption, ABACS can select the emergency vehicles that can most appropriately deal with an emergency and securely delegate the authority to control traffic facilities to the assigned emergency vehicles. Using novel cryptographic preliminaries, ABACS realizes confidentiality of messages, prevention of collusion attacks, and fine-grained access control. As compared to the current PKI scheme, the computational delay and transmission overhead can be reduced by exploiting the advantages afforded by message broadcasting, which is heavily used in ABACS. The performance evaluation demonstrates that ABACS is a suitable candidate for realizing emergency services via VANETs.
  • 14. IEEE 2012 NS2 Titles & Abstract FOR REGISTER: www.finalyearstudentsproject.com CONTACT NO.: 91-9176696486. Address: No.73, karuneegar street, Adambakkam, Chennai-88 15. Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance ABSTRACT Packet losses in the network have a considerable performance impact on transport- layer throughput. For reliabledata transfer, lost packets require retransmissions and thus cause very long delays. This tail of the packet delaydistribution causes performance problems. There are several approaches to trading off networking resources up-front to reduce long delays for some packets (e.g., forward error correction, network coding). We propose packet pacing as an alternative that changes traffic characteristics favorably by adding intentional delay inpacket transmissions. This intentional delay counters the principle of best effort but can reduce the burstiness of traffic and improve overall network operation - in particular in network with small packet buffers. As a result, pacing improves transport-layer performance, providing a tradeoff example where small amounts of additionaldelay can significantly increase connection bandwidth. We present a Queue Length Based Pacing (QLBP) algorithm that paces network traffic using a single queue and that can be implemented with small computational and memory overhead. We present a detailed analysis on delay bounds and the quantitative impact of QLBP pacing on network traffic. Through simulation, we show how the proposed pacing technique can improveconnection throughput in small-buffer networks.