Network Projects
A Scalable and Modular Architecture for High-Performance Packet Classification
Packet Classification is one of the core function in network infrastructure for various purposes. ..
A Secure and Efficient ID Based Aggregate Signature Scheme for Wireless Sensor Networks
Affording secure and efficient big data aggregation methods is very attractive in the field of wire..
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks
Data aggregation is an efficient way to minimize energy consumption on sensors. In this paper, we Pr..
A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks
We address the problem of centralized detection of a binary event in the presence of β fraction fal..
A SECURE PROTOCOL FOR SPONTANEOUS WIRELESS AD HOC NETWORKS CREATION
ABSTRACT A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmet..
A Self Adaptive Sleep Wake up Scheduling Approach for Wireless Sensor Networkss
Sleep/wake-up scheduling is one of the fundamental problems in Wireless Sensor Networks (WSNs), sin..
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
The main objective is accuracy detection on attack detection while considering the both normalizatio..
A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks
The number of security breaches is on a sharp increase and so is are the damage and los..
A Traffic Adaptive Multi channel MAC Protocol with Dynamic Slot Allocation for WSNs
Understanding existing algorithms and finding the problems stated and addressed. Using low duty-cycl..
A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks
Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are self organiz..
A Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-Scale Networks
Abstract The cognitive radio is an intellectual radio that can be planned and arranged energeti..
A Unifying Model and Analysis of P2P VoD Replication and Scheduling
Randomized user request on multimedia can be progressing on peer to peer network. Through repetition..
A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks
Geographical routing protocols have several desirable features for use in ad hoc and sensor networks..
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of m..