Tag Archives : Ns2 Projects with source code


The early detection of wildfires with monitoring sensors can improve the effectiveness of fire responders, decreasing the destruction of property and saving lives. However, distributing these sensors across a wide area is an expensive and laborsome task. Furthermore, the cost of the sensors themselves may be high, limiting their practicality […]

Samara: Biologically Inspired Self-Deploying Sensor Networks


Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one suchnetwork’s operation and effectiveness. The Web extra at https://youtu.be/4FRRI0aJLQM is an overview of the evolving threat landscape with Akamai Director of Web Security Solutions […]

Protecting Websites from Attack with Secure Delivery Networks


Translating behavioral information learned from analysis of a botnet’s software in controlled environments, to a model of how the botnet behaves in the wild is complicated by the fact that controlled environments do not account for a wide variety of user behavior, and that machines are not associated one-to-one with […]

Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity



Mobility is regarded as a network transport mechanism for distributing data in many networks. However, many mobility models ignore the fact that peer nodes often carried by people and thus move in group pattern according to some kind of social relation. In this paper, we propose one mobility model based on group behavior […]

An group behavior Mobility model for opportunistic ad hoc networks


In this mobile-centric era, users expect ubiquitous data access at low cost to an ever increasing range of applications requiring high data connection speeds. A positive solution is the use of Wireless MeshNetworks (WMN) as they enable data access over a relatively large area at a modest cost and are relatively […]

Link quality-aware overlay for video delivery over wireless mesh networks


Wireless communication provides convenience service for mobile devices. Considering different wireless characteristics, e.g., WIFI and 3G/4G, a mobile device user may manually change its wireless connection. For intelligent devices, users hope to keep the cooperative networking to work in background automatically. The paper introduces a new method of triggering cooperative networkingamong portable devices, […]

Activity recognition for triggering cooperative networking among on-vehicle smart devices



Recently, various medium access control (MAC) protocols have been proposed for underwater acoustic networks (UANs). These protocols have significantly improved the performance of MAC layer in theory. However, two critical characteristics, low transmission rates and long preambles, found in the commercial modem-based real systems, severely degrade the performance of existing MAC protocols […]

Toward Practical MAC Design for Underwater Acoustic Networks


Wireless Sensor Networks (WSN’s) is one of the most leading technology around the globe which make it possible to assemble the embedded systems of wallet size with the similar proficiency of a Personal Computer. It consists of self-governing battery powered devices known as nodes which act as a transducer. The nodes are […]

An algorithm to minimize energy consumption using nature-inspired technique in wireless sensor network


Throughout browsing the web or running applications on a wireless network, user’s private informationshould be hidden from other users. Private information may include the visited websites, downloaded files, chatting messages or any other web or network activities. Therefore, several encrypting protocols (such as: IPsec, TLS, SSL, etc.) and privacy mechanisms (such as: SSH […]

Wireless/Website Traffic Analysis & Fingerprinting: A Survey of Attacking Techniques and Countermeasures



Biometric systems are a part and parcel of everyone’s lives these days. However, with the increase in their use, the security risks associated with them have equally increased. Hence, there is an increased need to develop systems which use biometrics efficiently and ensure the authentication is integral and effective. This paper aims […]

A Generic Framework for EEG-Based Biometric Authentication