please contact us for this projects at low cost
S.NO
|
TITLE
|
DOMAIN
|
MONTH/YEAR
|
1
|
Cooperative Caching for Efficient Data
Access in Disruption Tolerant Networks
|
Mobile Computing
|
March 2014
|
2
|
Energy-Efficient Reliable Routing
Considering Residual Energy in Wireless Ad Hoc Networks
|
Mobile Computing
|
Feb 2014
|
3
|
Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
|
Networking
|
Feb 2014
|
4
|
Neighbor Table Based Shortcut Tree
Routing in ZigBee Wireless Networks
|
Parallel distributed systems
|
March 2014
|
5
|
Hop-by-Hop Message Authentication and
Source Privacy in Wireless Sensor Networks
|
Parallel distributed systems
|
May 2014
|
6
|
Link Quality Aware Code Dissemination in
Wireless Sensor Networks
|
Parallel distributed systems
|
July 2014
|
7
|
Constructing Load-Balanced Data
Aggregation Trees in Probabilistic Wireless Sensor Networks
|
Parallel distributed systems
|
July 2014
|
8
|
Incentive Based Data Sharing in Delay
Tolerant Mobile Networks
|
Wireless Communications
|
Jan 2014
|
9
|
Smart Grid Mesh Network Security Using
Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
|
Smart Grid
|
March 2014
|
10
|
Dynamic Trust Management for Delay
Tolerant Networks and Its Application to Secure Routing
|
Parallel Distributed Systems
|
May 2014
|
11
|
Cost-Aware Secure Routing (CASER)
Protocol Design for Wireless Sensor Networks
|
Parallel Distributed Systems
|
Preprint 2014
|
12
|
Secure and Reliable Routing Protocols for
Heterogeneous Multihop Wireless Networks
|
Parallel Distributed Systems
|
Preprint
|
13
|
Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
|
Parallel Distributed Systems
|
July 2014
|
14
|
Minimum Cost Blocking Problem in
Multi-Path Wireless Routing Protocols
|
Computers
|
July 2014
|
15
|
Privacy-Preserving and Truthful Detection
of Packet Dropping Attacks in Wireless Ad Hoc Networks
|
Mobile Computing
|
Preprint 2014
|
16
|
A Study on False Channel Condition
Reporting Attacks in Wireless Networks
|
Mobile Computing
|
May 2014
|
17
|
Bandwidth Distributed Denial of Service:
Attacks and Defenses
|
Security & Privacy
|
Jan-Feb 2014
|
18
|
STARS: A Statistical Traffic Pattern
Discovery System for MANETs
|
Dependable Secure Computing
|
March-April 2014
|
19
|
A Novel Approach to Trust Management in
Unattended Wireless Sensor Networks
|
Mobile Computing
|
July 2014
|
20
|
Designing Energy Routing Protocol with
Power Consumption Optimization in MANET
|
Emerging Topics in Computing
|
Preprint 2014
|
21
|
PSR: A Lightweight Proactive Source
Routing Protocol For Mobile Ad Hoc Networks
|
Vehicular Technology
|
Feb 2014
|
22
|
Defending Against Collaborative Attacks
by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
|
Systems Journal
|
Preprint 2014
|
23
|
Security Enhancements for Mobile Ad Hoc
Networks with Trust Management Using Uncertain Reasoning
|
Vehicular Technology
|
Preprint 2014
|
24
|
KNN Query Processing Methods in Mobile Ad
Hoc Networks
|
Mobile Computing
|
May 2014
|
25
|
AASR: Authenticated Anonymous Secure
Routing for MANETs in Adversarial Environments
|
Vehicular Technology
|
Preprint 2014
|