Wireless-NS2
Congestion-Avoidance-Routing-in-Wireless-Sensor-Networks
Congestion control is a strategy that is used to avoid network congestion and mitigate congestion. W..
Cooperative Energy Efficient Management of Federated WiFi Networks
The proliferation of overlapping, always-on IEEE 802.11 access points (APs) in urban areas, can caus..
Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks
Mobile adhoc network (MANET) is a wireless network of mobile devices without any infrastructure. An ..
Coordinated and Adaptive Information Collecting in Target Tracking Wireless Sensor Networks
It is important to ensure the data transmission with energy efficient and in secure manner. Energy c..
Cost-Aware Activity Scheduling for Compressive Sleeping Wireless Sensor Networks
A compressive sleeping wireless sensor network (WSN) for monitoring parameters in the sensor field..
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
We concentrate on this point and study the minimum number of infrastructure nodes that need to be ad..
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-re..
DBR-MAC: A Depth-Based Routing Aware MAC Protocol for Data Collection in Underwater Acoustic Sensor Networks-NS2
Due to long propagation delays, routing discovery is very expensive in underwater acoustic sensor ..
Decentralized-Smart-Sensor-Scheduling-for-Multiple-Target-Tracking-for-Border-Surveillance
Wireless micro sensor networks have been identified as one of the most important technologies. This ..
Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach
Wireless networks are computer networks that are not connected by cables of any kind. The use of wir..
Delay Analysis of Multichannel Opportunistic Spectrum Access MAC protocol
Delay analysis of multichannel is the most important issue that has been implemented in design of wi..
Delay Analysis of Physical Layer Key Generation in Dynamic Roadside-to-Vehicle Networks
Secret key generation by extracting the shared randomness in wireless fading channel is a promising..
Detecting and Localizing Wireless Spoofing Attacks
It is important to detect the spoofing attack in wireless sensor network. Many Techniques are used f..
Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays
The detection and tracing problems in a multi-relay network, where a source wants to exchange the ..
Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in w..