A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET Abstract– A vehicular ad hoc network (VANET) serves as an application of the intelligent transportation system that improves traffic safety as well as efficiency. Vehicles in a VANET broadcast traffic and safety-related information used by road safety applications, such as an emergency electronic brake light. The…
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks Abstract? Mobile Ad hoc Networks (MANET) are self-configuring, infrastructureless, dynamic wireless networks in which the nodes are resource constrained. Intrusion Detection Systems (IDS) are used in MANETs to monitor activities so as to detect any intrusion in the otherwise vulnerable…
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles Abstract? Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information. However, other performance requirements such as life cycle of nodes, stability and security are not set as primary design objectives. This makes data…
A Study of Sub-1 GHz Frequency Spectrum Utilization in India Abstract? Increased Usage of cutting edge technologies in Mobile and Broadband Wireless Access (MBWA) has resulted increase in the demand for spectrum. However frequency spectrum is a scarce resource, which needs to be utilized intelligently. Cognitive Radio(CR) is one of the upcoming technologies which allows…
A Trust Management System for Securing Data Plane of AdHoc Networks Abstract?The rapidly developing adhoc network technology has a wide range of applications, such as vehicular adhoc networks (VANETs), wireless sensor networks (WSNs), and emergency and military communications. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…
Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays Abstract? The detection and tracing problems in a multi-relay network, where a source wants to exchange the information with a destination through multiple potential malicious relay nodes. The destination could probabilistically detect the maliciousness in a multi-relay network if and only if the…
Distributed Opportunistic Scheduling With QoS Constraints for Wireless Networks With Hybrid Links Abstract? Opportunistic scheduling for a wireless network with hybrid links is studied in this paper. Specifically, two link types are considered: A link of the first type always has a much lower transmission rate than a link of the second type. To avoid…
Diversity Backpressure Scheduling and Routing With Mutual Information Accumulation in Wireless Ad-Hoc Networks Abstract? Routing in multi-hop wireless adhoc networks that exploit mutual information accumulation as the physical layer transmission scheme, and are capable of routing multiple packet streams (commodities) when only the average channel state information is present, and that only locally. The proposed…
FluidNet: A Flexible Cloud-based Radio Access Network for Small Cells Abstract?Cloud-based radio access networks (C-RAN) have been proposed as a cost-efficient way of deploying small cells. Unlike conventional RANs, a C-RAN decouples the baseband processing unit (BBU) from the remote radio head (RRH), allowing for centralized operation of BBUs and scalable deployment of light-weight RRHs…
Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection Abstract?An intrusion detection system (IDS) for vehicular adhoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ]…
Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack Abstract? Spectrum sensing and spectrum sharing are two fundamental issues in a cognitive radio network (CRN). The spectrum sensing data falsification (SSDF) attack imposes bad effects on both spectrum sensing and spectrum sharing. To deal with SSDF attacks…
Large-Scale Multi-Cluster MIMO Approach for Cognitive Radio Sensor Networks Abstract?a large-scale cooperative multiple-input multiple-output (CMIMO) beamforming scheme for uplink (UL) access in broadband cognitive radio wireless sensor networks (CR-WSNs) sharing the same spectrum with a primary network and employing orthogonal frequency-division multiplexing. The CR-WSN is divided into clusters each consisting of cooperative nodes that form…