LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement Abstract? LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement. Network-wide traf?c measurement is of interest to network operators to uncover global network behavior for the management tasks of traf?c accounting, debugging or troubleshooting, security, and traf?c engineering. Increasingly, sophisticated network measurement tasks such as anomaly detection and…
Lightweight Location Verification Algorithms for Wireless Sensor Networks Abstract? The knowledge of sensors’ locations is crucial information for many applications in Wireless Sensor Networks (WSNs). When sensor nodes are deployed in hostile environments, the localization schemes are vulnerable to various attacks, e.g., wormhole attack, pollution attack, range enlargement/reduction attack, and etc. Therefore, sensors’ locations are…
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks Abstract?Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks. We propose lightweight protocol for securing communication and preserving users’ anonymity and location privacy in hybrid ad hoc networks. Symmetric-key-cryptography operations and payment system are used to secure route discovery and…
Load Balancing in IP Networks Using Generalized Destination-Based Multipath Routing Abstract? Load Balancing in IP Networks Using Generalized Destination-Based Multipath Routing. Intradomain traffic engineering (TE) has become an indispensable tool for Internet service providers (ISPs) to optimize network performance and utilize network resources efficiently. Various explicit routing TE methods were recently proposed and have been…
Load Balancing Under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks Abstract-RPL is an IPv6 routing protocol for low-power and lossy networks (LLNs) designed to meet the requirements of a wide range of LLN applications including smart grid AMIs, industrial and environmental monitoring, and wireless sensor networks. RPL allows bidirectional end-to-end…
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation Abstract? Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation. Collaborative Filtering (CF) is widely employed for making Web service recommendation. CF-based Web service recommendation aims to predict missing QoS < Final Year Proejcts 2016 > Quality-of-Service values of Web services. Although several CF-based Web service…
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks Abstract? Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. Location sharing is one of the critical components in mobile online social networks (m OSNs), which has attracted much attention recently. With the advent of m OSNs, more and more users? location information will…
Mobile Based Healthcare Management using Artificial Intelligence Abstract? Mobile Based Healthcare Management using Artificial Intelligence. In this growing age of technology it is necessary to have a proper health care management system which should be cent percent accurate but also should be portable so that every person carry with it as personalized health care system….
Mobile IPv6 (MIPv6) Route Optimization Security Design Protocol Abstract?Abstract Unlike Mobile IPv4, where mobile node communicates with its peer through a longer path, via Home Agent, in Mobile IPv6 a mobile node directly communicates with its peers even though it moves to the new location and changes its IP address, this mechanism is called Route…
Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks Abstract?Abstract This paper investigates energy-efficient device-to-device (D2D) communications in cellular networks. We aim to maximize the overall energy-efficiency (EE) of D2D users and regular cellular users (RCUs) while considering the circuit power consumption and the quality-of-service (QoS) requirements for both types of users as well as…
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol Abstract-The Internet of Things (IoT) paradigm is changing the way people live and work in society. Advancements in various information and communication technologies have paved the way for new possibilities and opportunities both in households and industries to build such an Internet of connected…