Posts by Network Simulator 2

Extending the lifetime of barrier coverage by adding sensors to a bottleneck region

Extending the lifetime of barrier coverage by adding sensors to a bottleneck region

One important application of wireless sensor networks (WSNs) is intruder detection for protection of a region of interest, and k-barrier coverage is...

Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme

Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme

A Wireless Sensor network is very exposed to different type of attacks and the most common one is the Sybil attack. A...

Web-based online embedded door access control and home security system based on face recognition

Web-based online embedded door access control and home security system based on face recognition

Smart home security control system has became indispensable in daily life. The design and development of a home security system, based on human face...

TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks

TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks

Wireless Sensor Networks are by its nature prone to various forms of security attacks. Authentication and secure communication have become the need of the...

An robust recursive ant colony optimization strategy in VANET for accident avoidance (RACO-VANET)

An robust recursive ant colony optimization strategy in VANET for accident avoidance (RACO-VANET)

VANET (Vehicle Ad-hoc Network) [1] is an emerging technology that enables the vehicles to communicate with each other. Nowadays, we see...

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized...

Seclius: An Information Flow-Based, Consequence-Centric Security Metric

Seclius: An Information Flow-Based, Consequence-Centric Security Metric

It is critical to monitor IT systems that are part of energy delivery system infrastructure. The problem with intrusion detection...

Estimating Traffic and Anomaly Maps via Network Tomography

Estimating Traffic and Anomaly Maps via Network Tomography

Mapping origin-destination (OD) network traffic is pivotal for network management and proactive security tasks. However, lack of sufficient flow-level measurements as well as potential...

A review on secure communication protocol for wireless ad hoc network

A review on secure communication protocol for wireless ad hoc network

The exponential growth and development in the wireless communication, Wireless communication technology gains an importance and can be used in...

Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications

Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications

Security of one-time password (OTP) is essential because nowadays most of the e-commerce transactions are performed with the help of this...

1 2 3 4 5 6 7 8 9 10

NS2 Member Accounts | |
© 2005 - 2024 Vanet Projects

© 2005 - 2024 Matlab Projects