Research Article Volume 6 Issue No. 6

Size: px
Start display at page:

Download "Research Article Volume 6 Issue No. 6"

Transcription

1 DOI / ISSN IJESC ` Research Article Volume 6 Issue No. 6 Military Applications using Wireless Sensor Networks: A survey Ishfaq Ahmad 1, Khalil Shah 2, Saif Ullah 3 Department of computer Science Abdul Wali khan University Mardan 1 Khyber Pakhtoonkhwa, Pakistan 2, 3 ashfaq9701@gmail.com 1, escallanio@gmail.com 2 Abstract: Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the loss. In this paper, we analyze the existing literature of using WSNs for military applications. We will discuss the available scenarios of using sensor nodes in the military uses. We aim to present a better deployment of sensor nodes for military purposes with the help of existing research work. We will try to identify different areas in which we can reduce the damage in case of militant s attack or enemy s outbreak using an intelligent deployment of nodes. Keywords: Wireless Sensor Networks, Military Surveillance, Sensor Nodes, Intrusion Detection. I. INTRODUCTION The rise of Wireless Sensor Networks (WSNs) has brought revolution in the field of technology. These networks comprise of a large number of densely deployed sensor nodes which works through collaboration. In WSNs, each sensor node has limited resources such as, low energy, less bandwidth, limited memory and small computational power. These nodes are very inexpensive in terms of cost, so resource limitation is not a big problem. If a node runs out of energy, so instead of replacing the battery, we can replace the entire node with a new node. There are different types of sensors available like temperature sensor, humidity sensor, multimedia sensor and others. Due to these variant sensors, WSNs got applications in different fields such as environment monitoring, agriculture monitoring, industrial monitoring, health monitoring, home applications and military operations. Sensor Networks were initially designed for military operations and surveillance [1-4]. WSNs have been emerged as an excellent tool for military applications involving intrusion detection, various parameter monitoring, information gathering and, smart logistics support in an unknown deployed area [5, 6]. These networks can provide different services to military and air force like information collection, battlefield surveillance and attack detection [7-11]. Because of their capabilities of real time transmission, WSNs play an important role in military operations. These networks offer several advantages over traditional sensor devices such as fault tolerance, robustness and low budget deployment. In case of enemy attack, some nodes will be damaged but node damage in WSNs does not disturb the complete network. Due to their unique characteristics [12-18], these networks are well-known among the research communities and industrialpartners II. RELATED WORK In literature, there exist various studies about implementing WSNs in military applications. Authors discussed these applications in different parts of military operations from different perspectives. In [19-26], different areas are pointed where WSNs can be deployed in order to obtain better results and desired outputs. These areas include intrusion detection, enemy tracking and target classification, battlefield surveillance, battlefield damage assessment, target system and detection of Nuclear Biological Chemical (NBC) attacks [27, 28]. A. Intrusion Detection Sensor networks can be used as a 2-phase in Intrusion Detection System.Instead of using mines, intrusion can be spotted with the help of sensor network in a particular area. Mines [29-33 can target the civilians as well so as an alternative of mines; sensor nodes sense the environment and alarm the forces. B. Battlefield Surveillance Critical areas and borders can be closely monitored using sensor networks to obtain information about any enemy activity in that area. This provides quick gathering of information provides time for quick response [34]. International Journal of Engineering Science and Computing, June

2 There are various other applications of WSNs in military responsibilities. In [35-37], different tasks are discussed for which sensor nodes can be used. These include some of above mentioned areas while the other tasks for which these networks can be implemented are monitoring friendly forces, equipment, and ammunition and targeting. Aerostat acoustic payload for transient and helicopter detection and novel shoe scanner using an open-access quadruple resonance sensor are also part of the existing literature. C. Aerostat Acoustic Payload for Transient and Helicopter Detection Using acoustic sensor shows suspended under attached aerostats The Army Research Laboratory (ARL) has led tests to locate and constrain transitory motions from mortars, big guns and little arms release. The same aerostat and unattended ground sensor UGS joint effort can track adjacent helicopters in 3d for tie evasion [38]. D. A Novel Shoe Scanner using an Open-access Quadruple Resonance Sensor Novel shoe scanner advanced at the GE Security San Diego Centre of Excellence utilization Quadruple Resonance (QR) to distinguish explosives stowed away in shoes [39]. The shoe scanner was created with an open-access frame and filtering chamber that permits travelers to stand in the framework in a regular position throughout the checking process [4]. Advances in group filter applications to sea mine detection, Omni Bird a miniature PTZ NIR sensor system for UCAV day/night autonomous operations, Low-cost acoustic sensors for littoral anti-submarine war-fare (ASW) are also being presented in [40]. E. Advances in Group Filter Applications to Sea Mine Detection It is extremely challenging to separate questions in the underwater environment which change in size, shape, and introduction from regularly happening and man-made disorder. For that unmanned underwater vehicle (UUV) sensor frameworks described by high sensor information rates and constrained preparing capabilities is utilized by Naval Surface Warfare Centre Panama City (NSWC PC) to output the sonar picture and characterize the picture characteristics, geometrically characterized structures with introductions, and confined ghastly data into different orthogonal parts or emphasize sub-spaces of the picture [4]. Early attack reaction sensing element (EARS), Time difference of arrival blast localization using a net-work of disposable sensors, Novel optical sensor system for missile canisters continuous monitoring and Acoustic threatening sound recognition system are also included in the contents of the same paper. Tracking military vehicles, sniper localization and Self- Healing Mine Field is also the portion of the existing study in the form of [7]. In tracking military vehicles, the WSNs should be hidden and hard to abolish. For sniper localization, a WSN is being used to locate snipers and the trajectory of bullets [5], providing valuable clues for law enforcement. The deployment of Wireless Sensor Networks (WSNs) can solve the problem of enemy force deployment uncertainty. Where ever the force is deployed, senor nodes will capture their presence and will inform. Then you have to send your army to that particular area to protect it. These networks can also be deployed in urban areas to make sure peaceful environment. III. COMPARISONS OF MILITARY APPLICATIONS As discussed in above section, different authors discussed the applications of Wireless Sensor Networks (WSNs) for military purposes from different perspectives. Here we will try to compare the study in existing literature and after that comparison, we will be able to extract a better way of using these sensor networks for military purposes. In [6], it is proposed to use the WSNs in battlefield surveillance to closely monitor the critical areas and borders to obtain information about enemy activity in that area. Hence, we will gather information quickly which will result in quick response. Another way of using sensornodes for battlefield surveillance is as the operations advance and new operational arrangements are ready, new sensor systems could be conveyed for front observation [4]. Both the approaches are good. Everyone have its advantages. Border monitoring is an essential component of military surveillance to prevent enemy s intrusion. In normal circumstances, it may be enough just to monitor borders but in case of war, new sensor nodes are necessary to know the conditions of front areas so that you can adopt an appropriate plane. Nuclear, Biological and chemical (NBC) attack detection is an important application of Wireless Sensor Networks (WSNs). Nuclear, Biological and chemical (NBC) agents can be sensed by sensors and embedded warning system can now send a warning message. It provides the military critical response time to check the situation and prevent possible attacks which International Journal of Engineering Science and Computing, June

3 can save lives of many [6]. It is good that t can sense the NBC and can save many lives but it should be make sure that it can sense the NBC even in a very little size and at very early stage. For this purpose the sensor nodes can be placed close to these to the plant and their threshold value should be set even very low than the danger limit so that preventive measures can be taken before the danger limit is reached. Tracking military vehicles is another important aspect of using sensors in military side. Here, sensor nodes are deployed from an unmanned aerial vehicle (UAV) [7] [40-43]. In order to sense the closeness of tanks, Magnetometer sensors are attached to the nodes. Sensor nodes collaborate in order to estimate the path and velocity of tracked vehicle. In order to track these vehicles, the tracking object should have a predefined amount of metallic material. Thisamount can be specified by the programmer while programing the sensor. IV. CONCLUSION From above discussion, it is clear that WSNs plays an important role in military operations. With the help of these networks, not only the critical areas can be monitored but also due to its flexible nature, it can be expanded to the nearby areas according to the requirements with the passage of time. Moreover due to its fault tolerance characteristic, if any node got damaged, the rest of the network will continue sensing. Rest of the network will not be affected due to the damage of a single or a group of sensors. The use of Wireless Sensor Networks (WSNs) will reduce the casualty rate. Normally these networks are deployed in risky and critical areas where there is always a strong threat to soldiers in case of their presence. The damage of sensor nodes in that scenario is not noticeable because of their easily availability and inexpensive nature. As we discussed earlier, Wireless Sensor Networks (WSNs) have a vast variety of applications for military purposes, but keeping in mind the importance and critical nature of security and safety, there should be a number of more applications are possible in military operations. This requires further research in this field. REFERENCES [1]. M. Pejanović Đurišić1, Z. Tafa1, 2, G. Dimić3, and V. Milutinović2, A Survey of Military Applications of Wireless Sensor Networks ; 2012 Mediterranean Conference on Embedded Computing (MECO); June 19, 2012, ISSN: ; Publisher IEEE [2]. Michael Winkler, Klaus-Dieter Tuchs, Kester Hughes, and Graeme Barclay, Theoretical and practical aspects of military wireless sensor networks ; journal of telecommunication and information technology, February 2008, Vol Issue 2, p37-43 [3]. Carlos F. García-Hernández, Pablo H. Ibargüengoytia- González, JoaquínGarcía-Hernández, and Jesús A. Pérez-Díaz*; Wireless Sensor Networks and Applications: a Survey ; IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.3, March 2007 [4]. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual Head Clustering Scheme in Wireless Sensor Networks. in the IEEE International Conference on Emerging Technologies (pp. 1-8). Islamabad: IEEE Islamabad. [5]. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, A robust authentication scheme for observing resources in the internet of things environment in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp , 2014, IEEE. [6]. Khan, F., & Nakagawa, K. (2012). Performance Improvement in Cognitive Radio Sensor Networks. in the Institute of Electronics, Information and Communication Engineers (IEICE), 8. [7]. M. A. Jan, P. Nanda and X. He, Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN, in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp , Springer, Berlin, Germany, [8]. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness Improvement in long-chain Multi-hop Wireless Adhoc Networks. International Conference on Connected Vehicles & Expo (pp. 1-8). Las Vegas: IEEE Las Vegas, USA. [9]. M. A. Jan, P. Nanda, X. He and R. P. Liu, Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp , [10]. Q. Jabeen, F. Khan, S. Khan and M.A Jan. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. in the Journal Applied, Environmental, and Biological Sciences (JAEBS), vol. 6(4S), pp Print ISSN: Online ISSN: , TextRoad. [11]. Khan, F., & Nakagawa, K. (2013). Comparative Study of Spectrum Sensing Techniques in Cognitive Radio Networks. in IEEE World Congress on Communication and Information Technologies (p. 8). Tunisia: IEEE International Journal of Engineering Science and Computing, June

4 Tunisia. [12]. Khan, F. (2014). Secure Communication and Routing Architecture in Wireless Sensor Networks. the 3 rd Global Conference on Consumer Electronics (GCCE) (p. 4). Tokyo, Japan: IEEE Tokyo. [13]. M. A. Jan, P. Nanda, X. He and R. P. Liu, PASCCC: Priority-based application-specific congestion control clustering protocol Computer Networks, Vol. 74, PP , [14]. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE. [15]. Mian Ahmad Jan and Muhammad Khan, A Survey of Cluster-based Hierarchical Routing Protocols, in IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013, pp [16]. Khan, S., Khan, F., & Khan, S.A.(2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8). Riyadh: IEEE Riyad Chapter. [17]. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp ). IEEE. [18]. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. M. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. in the Journal Applied, Environmental, and Biological Sciences Print ISSN: Online ISSN: [19]. Mian Ahmad Jan and Muhammad Khan, Denial of Service Attacks and Their Countermeasures in WSN, in IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April [20]. M. A. Jan, P. Nanda, X. He and R. P. Liu, A Sybil Attack Detection Scheme for a Centralized Clusteringbased Hierarchical Network in Trustcom/BigDataSE/ISPA, Vol.1, PP , 2015, IEEE. [21]. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan., S.R., Ullah, F., (2016) A Survey : Embedded Systems Supporting By Different Operating Systems in the International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : , Online ISSN : , Volume 2 Issue 2, pp [22]. Syed Roohullah Jan, Syed TauhidUllah Shah, Zia UllahJohar, Yasin Shah, Khan, F., " An Innovative Approach to Investigate Various Software Testing Techniques and Strategies", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : , Online ISSN : , Volume 2 Issue 2, pp , March-April URL : [23]. Khan, F., Jan, SR, Tahir, M., & Khan, S., (2015) Applications, Limitations, and Improvements in Visible Light Communication Systems In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp ). IEEE. [24]. Syed Roohullah Jan, Khan, F., Muhammad Tahir, Shahzad Khan,, (2016) Survey: Dealing Non-Functional Requirements At Architecture Level, VFAST Transactions on Software Engineering, (Accepted 2016) [25]. M. A. Jan, Energy-efficient routing and secure communication in wireless sensor networks, Ph.D. dissertation, [26]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A Lightweight Mutual Authentication Scheme for IoT Objects, IEEE Transactions on Dependable and Secure Computing (TDSC), Submitted, [27]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A Sybil Attack Detection Scheme for a Forest Wildfire Monitoring Application, Elsevier Future Generation Computer Systems (FGCS), Accepted, [28]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, August). DPBSV--An Efficient and Secure Scheme for Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp ). IEEE. [29]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In Web Information Systems Engineering WISE 2015 (pp ). Springer International Publishing. [30]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2016). A dynamic prime number based efficient security mechanism for big sensing data streams.journal of Computer and System Sciences. [31]. Puthal, D., &Sahoo, B. (2012). Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure International Journal of Engineering Science and Computing, June

5 and Energy efficient data collection technique. [32]. Puthal, D., Sahoo, B., &Sahoo, B. P. S. (2012). Effective Machine to Machine Communications in Smart Grid Networks. ARPN J. Syst. Softw AJSS Journal, 2(1), [33]. M. A. Jan, P. Nanda, M. Usman, and X. He, PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks, accepted, [34]. M. Usman, M. A. Jan, and X. He, Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds, Elsevier Information sciences, accepted, [35]. Jan, S. R., Khan, F., &Zaman, A. THE PERCEPTION OF STUDENTS ABOUT MOBILE LEARNING AT UNIVERSITY LEVEL. NO. CONTENTS PAGE NO., 97. [36]. Khan, F., & Nakagawa, K. (2012). B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks. 電子情報通信学会ソサイエティ大会講演 論文集, 2012(2), 152. [37]. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S. R. Comparative Study of Routing Protocols in Mobile Adhoc Networks. [38]. Shahzad Khan, Fazlullah Khan, FahimArif, QamarJabeen, M.A Jan and S. A Khan (2016). Performance Improvement in Wireless Sensor and Actor Networks, Journal of Applied Environmental and Biological Sciences, Vol. 6(4S), pp , Print ISSN: Online ISSN: , TextRoad. [39]. M. Usman, M. A. Jan, X. He and P. Nanda, Data Sharing in Secure Multimedia Wireless Sensor Networks, in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), accepted, [40]. Ananyachatterjee, ManjushaPandey; Practical Applications of Wireless Sensor Network Based on Military, Environmental, Health and Home Applications: A Survey ; International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ,, ISSN [41]. Gyula Simon Miklós Maróti Ákos Lédeczi György Balogh Branislav Kusy András Nádas Gábor Pap János Sallai Ken Frampton; Sensor Network-Based Counters niper System ; SenSys'04 Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, USA, November 2004ISBN: [42]. Ms. Sunita, Jyoti Malik, SumanMor; Comprehensive Study of Applications of Wireless Sensor Network ; International Journal of Advanced Research in Computer Science and Software Engineering;Volume 2, Issue 11, November 2012; ISSN: X. [43]. Kay Romer, Friedemann Mattern; The Design Space of Wireless Sensor Networks ; IEEE Wireless Communications, Volume: 11, Issue: 6, pp , December 2004, ISSN: International Journal of Engineering Science and Computing, June

A Comparison between RISC and CISC Microprocessor Architectures

A Comparison between RISC and CISC Microprocessor Architectures A Comparison between RISC and CISC Microprocessor Architectures Shahla Gul 1, Noman Aftab 1, Arfa 1, Rani 1 1 Department of Computer Science, Abdul Wali Khan University Mardan, KPK, Pakistan Email: * escallanio@gmail.com

More information

Request-Response Interaction Model in Constrained Networks

Request-Response Interaction Model in Constrained Networks Request-Response Interaction Model in Constrained Networks Izaz Ahmad Khan 1 *, Muhammad Safdar 2, Farman Ullah 3, Syed Roohullah Jan 4, Fazlullah Khan 5, Sabir Shah 6 1,2,3,6 Department of Computer Science,

More information

A BRIEF SURVEY OF ACOUSTIC WIRELESS SENSOR NETWORK

A BRIEF SURVEY OF ACOUSTIC WIRELESS SENSOR NETWORK A BRIEF SURVEY OF ACOUSTIC WIRELESS SENSOR NETWORK Mansoor Ullah 1, Abbas Khan 2, Muhammad Adil 3 1.2,3 Department of Computer Science, Abdul Wali Khan University Mardan, Pakistan Abstract: Our world covers

More information

An Innovative Approach to Investigate Various Software Testing Techniques and Strategies

An Innovative Approach to Investigate Various Software Testing Techniques and Strategies 2016 IJSRSET Volume 2 Issue 2 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Innovative Approach to Investigate Various Software Testing Techniques and Strategies

More information

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 2, Mar - Apr 2016

International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 2, Mar - Apr 2016 RESEARCH ARTICLE Comparative Study of Routing Protocols in Mobile ADHOC Networks Muhammad Safdar, Izaz Ahmad Khan, Farman Ullah Department of Computer Science Bacha Khan University Charsadda, Khyber Fazlullah

More information

Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks

Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Inam Ullah Khan 1, Nazia Azim 2,Syed Bilal Hussain Shah, Yin Fuliang 4, Muhammad Sameen 5 1 Isra University, Islamabadad

More information

A Systematic Overview of Routing Protocols in WSNs

A Systematic Overview of Routing Protocols in WSNs A Systematic Overview of Routing Protocols in WSNs Haroon khan 1*, Fazlullah Khan 1, Muhammad Noman Hayat 1, Muhammad Yaseen Khan 1, Maqbool Shah 1 1 Department of Computer Science, Abdul Wali Khan University

More information

A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT

A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT Nazia Azeem 1*, Iftikhar Ahmad 2*, Syed Roohullah Jan 3, Muhammad Tahir 4, Farman Ullah 5, Fazlullah Khan 6

More information

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks --- Concepts and Challenges Wireless Sensor Networks --- Concepts and Challenges Outline Basic Concepts Applications Characteristics and Challenges 2 1 Basic Concepts Traditional Sensing Method Wired/Wireless Object Signal analysis

More information

***

*** Review of Cluster-based Energy Routing Protocols for WSNs Muhammad Noman Hayat 1, Fazlullah Khan 1, Haroon Khan 1, Muhammad Yaseen Khan 1, Maqbool Shah 1 1 Dept. of Computer Science, Abdul Wali Khan University

More information

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks --- Concepts and Challenges Outline Wireless Sensor Networks --- Concepts and Challenges Basic Concepts Applications Characteristics and Challenges 2 Traditional Sensing Method Basic Concepts Signal analysis Wired/Wireless Object

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

WIRELESS SENSOR NETWORK MAC PROTOCOL SMAC AND TMAC

WIRELESS SENSOR NETWORK MAC PROTOCOL SMAC AND TMAC 45 WIRELESS SENSOR NETWORK MAC PROTOCOL SMAC AND TMAC Fazli Rahim (Main author) 1, Wajidan Haider 2, Luqman Khan 3 MS(IT) Lecturer Govt: Postgraduate college dargai malakand, Pakistan rahim.skt@gmail.com

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

COMPREHENSIVE STUDY OF THE APPLICATIONS OF WIRELESS SENSOR NETWORK

COMPREHENSIVE STUDY OF THE APPLICATIONS OF WIRELESS SENSOR NETWORK Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 3, March 2013,

More information

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging

More information

References. The vision of ambient intelligence. The missing component...

References. The vision of ambient intelligence. The missing component... References Introduction 1 K. Sohraby, D. Minoli, and T. Znadi. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. H. Karl and A. Willig. Protocols and Architectures

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network Deepthi G B 1 Mrs. Netravati U M 2 P G Scholar (Digital Electronics), Assistant Professor Department of ECE Department

More information

An Introduction to Cyber-Physical Systems INF5910/INF9910

An Introduction to Cyber-Physical Systems INF5910/INF9910 An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More

More information

Optimal Path Selection Using Dijkstra s Algorithm in Cluster-based LEACH Protocol

Optimal Path Selection Using Dijkstra s Algorithm in Cluster-based LEACH Protocol 2017, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Optimal Path Selection Using Dijkstra s Algorithm in Cluster-based LEACH Protocol Faheem

More information

Wireless networks: from cellular to ad hoc

Wireless networks: from cellular to ad hoc Wireless networks: from cellular to ad hoc The three wireless waves Wave #1: cellular telephony Still, biggest profit maker Wave #2 : wireless Internet access Most Internet access on US campuses is wireless

More information

A Review on Wireless Sensor Networks

A Review on Wireless Sensor Networks A Review on Wireless Sensor Networks Astt prof. Jagtar Singh Department Of Computer Science Haryana College Of Technology And Management Kaithal, Kurukshetra University Anu Arya Department Of Computer

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

IoT Based Traffic Signalling System

IoT Based Traffic Signalling System IoT Based Traffic Signalling System Ashok. P.V B.Tech Graduate, Department of Information Technology, SivaSankari.S Assistant Professor, Department of Information Technology, Vignesh Mani B.Tech Graduate,

More information

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services

More information

Energy Efficient Routing Protocols in Wireless Sensor Network

Energy Efficient Routing Protocols in Wireless Sensor Network Energy Efficient Routing Protocols in Wireless Sensor Network 1 Vinesh Kumari, 2 Hakam Singh, 3 Pratibha Sharma 1 Student Mtech, CSE 4 th SEM, 2 Assistant professor, CSE, 3 Assistant professor, CSE Career

More information

Selective Forwarding Attacks Detection in WSNs

Selective Forwarding Attacks Detection in WSNs Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DRINA: A SECURE CLUSTERING ALGORITHM POONAM V. SADAFAL, RAHUL C. SALUNKHE Dept.

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015) FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS C.Ahila Jerlin #1 Anand Institute of Higher Technology, Department of ME Embedded System Technologies, Kazhipattur, Chennai-603103 N.Rajkamal #2 Anand Institute

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Design Issues during Wireless Sensor Networks Deployment

Design Issues during Wireless Sensor Networks Deployment EUROPEAN ACADEMIC RESEARCH Vol. I, Issue 12/ March 2014 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.1 (UIF) DRJI Value: 5.9 (B+) Design Issues during Wireless Sensor Networks Deployment SYED ABDUL

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) (ENCS 691K) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/

More information

A survey of wireless sensor networks deployment techniques

A survey of wireless sensor networks deployment techniques A survey of wireless sensor networks deployment techniques Michał Marks Institute of Control and Computation Engineering Warsaw University of Technology Research and Academic Computer Network (NASK) DSTIS

More information

A Survey on Wireless Multimedia Sensor Network

A Survey on Wireless Multimedia Sensor Network A Survey on Wireless Multimedia Sensor Network R.Ramakrishnan, R.Ram Kumar Associate Professor, Department of MCA, SMVEC, Madagadipet, Pondicherry, India P.G. Student, Department of Information Technology,

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

AT Ground Surveillance System (GSS)

AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

Microcontroller-Based Wireless Sensor Networks Prof. Kasim M. Al-Aubidy Philadelphia University

Microcontroller-Based Wireless Sensor Networks Prof. Kasim M. Al-Aubidy Philadelphia University Embedded Systems Design (0630414) Lecture 14 Microcontroller-Based Wireless Sensor Networks Prof. Kasim M. Al-Aubidy Philadelphia University Introduction: Wireless Sensor Networks (WSNs) have been identified

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Research Directions in Low-Power Wireless Networks

Research Directions in Low-Power Wireless Networks Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Energy-efficient Routing and Secure Communication in Wireless Sensor Networks

Energy-efficient Routing and Secure Communication in Wireless Sensor Networks Energy-efficient Routing and Secure Communication in Wireless Sensor Networks A Thesis Submitted for the Degree of Doctor of Philosophy By Mian Ahmad Jan in Faculty of Engineering and Information Technology

More information

A Survey on Energy Efficiency in WSN

A Survey on Energy Efficiency in WSN A Survey on Energy Efficiency in WSN Axada.A.Shinde 1, Krunal J. Panchal 2 1 Research Scholar, Information & Technology Department, L.J. Institute of Engineering & Technology, Gujarat, India 2 Assistant

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 768 Overview of Border Control Using Wireless Sensor Network Mosad H Alkhathami Department of Electrical and Computer

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps

Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps Thendral Puyalnithi #1, V Madhu Viswanatham *2 School of Computer Science and Engineering,

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

Event Detection through Differential Pattern Mining in Internet of Things

Event Detection through Differential Pattern Mining in Internet of Things Event Detection through Differential Pattern Mining in Internet of Things Authors: Md Zakirul Alam Bhuiyan and Jie Wu IEEE MASS 2016 The 13th IEEE International Conference on Mobile Ad hoc and Sensor Systems

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Basics of Wireless Sensor Network

Basics of Wireless Sensor Network Basics of Wireless Sensor Network A sensor network is an infrastructure contain sensing (measuring), computing and communication elements that gives an administrator the ability to device to observe and

More information

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) (ENCS 691K Chapter 7) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/

More information

Connected Car Solutions Based on IoT

Connected Car Solutions Based on IoT FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the

More information

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Rinku Sharma 1, Dr. Rakesh Joon 2 1 Post Graduate Scholar, 2 Assistant Professor, Department of Electronics and Communication

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems Pervasive Computing Institute of Networked and Embedded Systems OpenLab 2010 Jan 14 04pm L4.1.01 MISSION STATEMENT Founded in 2007, the Pervasive Computing Group at Klagenfurt University is part of the

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Comparison of MANET and Sensor in Ad hoc Network

Comparison of MANET and Sensor in Ad hoc Network Comparison of MANET and Sensor in Ad hoc Network Tejeswar Raju V Vineeth V Sneha Raju tejeswarrajuv@gmail.com vineeth.381994@gmail.com sneharaju666@gmail.com Ajina Jaya Professor C.S.E department ajinajaya@gmail.com

More information

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Manijeh Keshtgary Reza Mohammadi Mohammad Mahmoudi Mohammad Reza Mansouri ABSTRACT Underwater

More information

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] PD Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Science University of Erlangen http://www7.informatik.uni-erlangen.de/~dressler/

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

A Fault Tolerant Approach for WSN Chain Based Routing Protocols

A Fault Tolerant Approach for WSN Chain Based Routing Protocols International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 27 32 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Fault

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Mobile Sensor Swapping for Network Lifetime Improvement

Mobile Sensor Swapping for Network Lifetime Improvement International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Mobile

More information

Available online at ScienceDirect. Procedia Engineering 107 (2015 )

Available online at   ScienceDirect. Procedia Engineering 107 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 107 (2015 ) 480 484 Humanitarian Technology: Science, Systems and Global Impact 2015, HumTech2015 Smart Environment Monitoring

More information

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2 Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2 1 PG Scholar, 2 Assistant Professor Kathir College of Engineering Coimbatore (T.N.), India. Abstract

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks European Journal of Applied Sciences 8 (1): 41-46, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.1.22852 Quadratic Route Factor Estimation Technique for Routing Attack Detection

More information

EDAC: A Novel Energy-Aware Clustering Algorithm for Wireless Sensor Networks

EDAC: A Novel Energy-Aware Clustering Algorithm for Wireless Sensor Networks EDAC: A Novel Energy-Aware Clustering Algorithm for Wireless Sensor Networks Ahmad A. Ababneh Electrical Engineering Department Jordan University of Science & Technology Irbid, Jordan Ebtessam Al-Zboun

More information