DOI: /ijarcsse/V7I1/0116

Size: px
Start display at page:

Download "DOI: /ijarcsse/V7I1/0116"

Transcription

1 Volume 7, Issue 1, January 2017 ISSN: X Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng Research Paper Avalable onlne at: An nergy ffcent based Opportunstc Routng Metrc for Wreless Sensor Networks Sharda Ran Assstant Professor, Department of Computer Scence, R.K.S.D College, Kathal, Haryana, Inda DOI: /jarcsse/V7I1/0116 Abstract xstng cryptographc methods are not sutable for sensor networks because of ther lmted resources and opportunstc behavor of wreless nodes. In last four years, reputaton and trust aware methods are used to solve the ssue of securty n WSN. Data securty n transt s an mportant ssue for relable delvery of data n WSN. In ths paper, we have defned a new opportunstc routng (OR) metrc for sensor networks. The metrc s derved by usng energy consumpton and trustworthness of sensor nodes. The smulaton result shows that the metrc s able to detect a malcous actvty n the network segment. Ths metrc effectvely and effcently prevent from malcous actvtes and mantan data ntegrty. Keywords Routng Metrc, WSN, Trust, Secure Routng, Opportunstc Routng,. I. INTRODUCTION Cryptographc algorthms are not effcent n case of energy and storage n WSN, because of the lmted resources avalable n sensor nodes [3]. Hence, there s a need of cooperaton among sensor nodes n the network for securty purpose. But, takng the assumpton of hundred percent coordnaton s not vald. Sensor nodes n the deployment felds can easly be msconfgured, captured or hjacked by the attackers. The attackers may try to nject false nformaton n the network or try to destroy the network. However n recent years, researchers [4-8] have proposed cryptography based routng algorthms/protocols, but these algorthms are mostly provde soluton for outsde attacks. These algorthms are neffectve when there are nsder attacks from malcous sensor nodes. If we apply cryptographc algorthms for fghtng wth nsde attacks, than a lot of energy wll be wasted and network des soon. Hence there should be cooperaton and trust management between sensor nodes. To make successful delveres of data packets at base staton the trust management must be appled to routng process. The sensor nodes whch are havng low trust values must not be ncluded n routng process. As WSN are opportunstc networks n nature [9], rather than usng fxed path routng, opportunstc routng s very useful. But, when we talk about secure opportunstc routng protocols/algorthms, ether there are no proposed secure OR protocols/algorthms n lterature or there are very few whch are not much effcent n terms of energy and storage. The OR protocols must provde securty and effcency together. The securty n opportunstc routng protocols can be mproved by applyng routng decsons on the bass of trust values of sensor nodes n the network. To ncrease the probablty of a packet to reach destnaton, sensor nodes can utlze the trust based route dependablty nformaton. In opportunstc routng major phases are: forwarder set selecton and forwarder node selecton. The source, when has data to be sent over wreless lnk, frstly choose the forwarder set from the neghbor set. For ths purpose there s a requrement of certan crtera to be set. The forwarder set selecton process exclude those nodes whch are not able to fulfll the crtera. After ths process the canddate forwarder s selected and gven hgh prorty on the bass of opportunstc routng metrc (lke TX [10], mtx [11], AX [12] etc.). The routng decson n OR s purely dependent upon the metrc chosen for selectng canddate forwarder node [13]. In ths paper, a novel trust aware and energy effcent opportunstc routng metrc has been proposed whch s specally desgned for OR protocols n WSN. Ths metrc wll be compatble wth prevously proposed OR protocols for WSN. The metrc not only mprove the lfetme of the network but also the relablty and ntegrty of data. Major contrbutons of ths research work are gven below. A novel OR metrc has been proposed, whch consders the node trust value and energy effcency as major desgn factors. The parameters for desgnng the trust aware and energy effcent OR metrc are energy of the nodes, trust value of nodes, and lnk delvery probablty among nodes. Smulaton has been planned and executed to check the performance of the proposed OR metrc and framework appled to exstng OR protocols. Smulaton results valdate that ncorporatng the proposed trust metrc nto Destnaton Sequenced Dstance Vector Routng (DSDV) protocol. It can consderably ncrease the performance of DSDV communcatons n hostle envronments. 2017, IJARCSS All Rghts Reserved Page 191

2 Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), II. RLATD WORK The frst and popular OR protocol has been proposed by Bswas and Morrs [2], and called as XOR [10]. The authors shown that ths new dea of routng can work more effcently and effectvely n wreless networks. Authors have proposed a metrc, called as xpected Transmsson Count (TX) [10], for forwarder canddate set selecton. Ths metrc calculates the number of transmssons requred for a data packet to reach destnaton. Forwarder canddate nodes was chosen from the set of neghbor nodes. Later xpected anypath transmsson (AX) [12] metrc has been proposed by Dubos-Ferre`re et al. [16]. On the bass of ths metrc they have proposed an OR protocol and named t as LCOR. But, AX s computatonally complex and expensve for large scale wreless networks. Smlar to XOR, [17] presented SOAR whch uses TX as a metrc for canddate forwarder selecton, but t manly tres to decrease the number of duplcate data packets to be receved at destnaton node. In exstng OR protocols the focus has been gven on tmely data delvery and no or very lttle emphass has been gven to securty of data and routes n communcaton. Securty s always crucal n wreless networks, as the data packets are sent on unsecured and open wreless lnks [18]. Cryptography methods provde external securty to the network, so that any attacker from outsde cannot harm the network [3]. But to cope wth nternal attacks there s a need of coordnaton among nodes and securty wthn the network. To provde nternal securty n WSN there s a need of lghtweght methods. Because, sensor nodes have less capabltes lke less energy, low storage and small computaton power etc. Trust and management systems are very lghtweght and easly computable and mprove securty of communcaton wthn the network. Researchers n recent year have developed trust and reputaton management protocols and algorthms for ad hoc networks, nternet of thngs and other moble wreless networks. Some common names of protocols nclude CONFIDANT [19], COR [20] and SORI [21] etc. Saleh et al. [22] has proposed some metrcs and a trust aware routng framework for wreless networks recently. There have proposed three routng metrcs.e. RTOR [22], TORDP [22] and GOTOR [22], for opportunstc routng protocols for calculatng the trust value. They have proposed a trust aware opportunstc routng protocol prevously, whch s also developed for wreless networks. But these all are not purely meant for WSN and does not work well n sensor networks. Also for opportunstc routng, to the best of our knowledge, very few trust based systems have been proposed. Trust management n WSN has also been focused durng last three years. As sensor nodes have lmted resources, researchers try to balance between securty and utlzaton of resources. Deng et.al. have proposed a dynamc routng framework for WSN, whch ncorporates socal network theores of trust and named t as TARF [23]. TARF uses conventonal cryptographc approaches as complementary methods and provde securty solutons for WSN. nergy effcency s an ssue n ths protocol. Workng n WSN securty MPIR [24] protocol has been proposed. Ths s probablstc and dstrbuted montorng approach. It tres to decrease montorng tasks per node and save energy, by mantanng the approprate securty level. Another trust based routng protocol for WSN has been proposed and named as TARP [25]. Ths protocol defne routng paths on the bass of maxmum utlzaton of resources wth lesser communcaton cost. But ths s also not, much energy effcent approach havng greater overhead. Recently, TSRP [26] has been proposed by Ahmed et.al whch s also desgned to save energy and lower the cost and overhead n routng process for WSN. TLAR [27] has been proposed especally for WSN. TLAR calculates the consoldated trust values usng drect and ndrect observatons of ts neghbors. Ths routng scheme adjust the route weght values dynamcally agan and agan. Ths ncrease the overhead and communcaton delay ntroduces. In ths paper we have presented a trust aware energy effcent opportunstc routng metrc for WSN. It s beng evaluated by extensve smulatons to check the effect of new metrc on varous performance parameters. The routng metrc proposed here has been checked wth exstng broadcastng algorthm DSDV. III. TRUST AWAR NRGY FFICINT OR MTRIC As dscussed n lterature very few researchers have focused on securty and energy effcency n opportunstc routng for WSN. In ths research a new trust aware energy effcent opportunstc routng metrc has been proposed, provde securty of data n transt and mprove lfetme of the network. nergy cost model wll be the same as n our research paper publshed recently [28]. In opportunstc routng the most mportant phase s consdered s the forwarder canddate set selecton. In wreless sensor network, after sensng data, each sensor node form a lst of ts neghbors. From neghbor lst, the forwarder canddates has been chosen and s gven a prorty value. The hghest prorty node wll frst transmt the data frst. Opportunstc routng make t possble to utlze broadcastng nature of wreless lnks. To fnd the best wreless lnk routng metrcs have been appled to OR. In ths secton a new opportunstc metrc has been ntroduced especally for OR protocols n WSN. Ths metrc s dstrbutve n nature. Ths metrc needs nformaton about forwarder nodes ID, energy and packet recepton rato. After collecton of these values, the node calculates forwardng rato, acknowledgement mpact and energy consumpton. By ncludng these all values trust value has been calculated. Dstance (D) between nodes s not requred as major crtera, especally for opportunstc routng n WSN. Hence, dstance wll be used only for checkng the packet forwardng progress (PFP) towards destnaton (q. 1 and q. 2). D ( x x ) ( y y ), j j j 2 2 where 0, j k, and j (1) sd, PFP D D n s, d n, d 2017, IJARCSS All Rghts Reserved Page 192

3 Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), where s=source, d=destnaton, 0 n k (2) A. Proposed Metrc In opportunstc routng the forwarder node and the path of data packets have been decded at the tme of transmsson. ach sensor node mantan a matrx of trust evaluaton factors about other nodes and calculate the trust value for each forwarder canddate n neghbor lst. Metrc calculaton nvolves two step process as descrbed n below. Step 1: Trust valuaton In ths step, sensor node, when has data to send, form ts neghbor lst and extract the forwarder canddates on the bass of packet recepton rato (PRR) as calculated below n q. 3. Preceved PRR P where 0 PRR 1 (3) As soon as the forwarder lst has been made, the nodes now start calculatng the trust value for each node n the forwarder lst. The trust evaluaton conssts of followng trust factors. 1) Node Identfcaton (ID): Ths factor contans the locaton nformaton and the dentty of the forwarder canddate node. Source node collect ths nformaton from each node n the forwarder lst. ID NodeID, Locaton _ coordnates, nergy where 0 k 2) Forwardng Sncerty (F): Ths factor represents, whether the forwarder canddate node s forwardng the data packets successfully or not. Ths record s mantaned by usng the calculaton of success and falure counts. Intally ths value wll be 1 for each forwarder node. F : Forwardng sncerty value of node FS : Forwardng success count of node FF : Forwardng falure count of node. 3) nergy Depleton (): Ths factor calculates the energy consumpton for each transmsson made by a node. Ths factor s based on the nformaton of node s total energy. Also. Ths factor s used to calculate the lfetme of the node and the network. Ths factor s used to check whether the energy depleton s greater than threshold or not. If t s greater than threshold than the node cannot transfer data packets and excluded from the forwarder set. Otherwse a prorty has been set accordng to the value of ths factor. where, total : Total energy mpact of node : Transmsson energy, tx ( ) (4) 2017, IJARCSS All Rghts Reserved Page 193 sent total total tx rx ack : Recevng energy, rx ack : Acknowledgement sendng and recevng energy. 4) Acknowledgement Sncerty (ACK): Ths factor calculates the acknowledgement sendng and recevng sncerty among nodes. Ths record s mantaned by usng the calculaton of success and falure counts of acknowledgements transmssons. Also, ths value s useful to calculate the probablty of retransmsson of packets. Intally ths value wll be 1 for each forwarder node. ACK : Acknowledgement sncerty value of node SACK : Acknowledgement success count of node FACK : Acknowledgement falure count of node. 5) Trust Value (T): Ths factor gves the total trust value of a node and t wll be evaluated on the bass of all trust evaluaton factors. Ths value s dynamc n nature, because t needs to update agan and agan for every new transmsson of data packets. T : Trustworthness of node. Step 2: Trust Value Calculaton All trust evaluaton factors, dscussed above, values has been recorded n a matrx. As these values are dscrete, we cannot drectly judge the value n a logcal decson of trustng a node or not. Hence, the next step s to quantze the values of trust factors, so that the values wll be transformed nto contnuous values from -1 to +1. Here -1 means no trust and +1 means full trust. Trust quantfcaton for each trust factor can be calculated as follows: 1) Forwardng Sncerty Value 2) nergy Depleton Value FS FF F FS FF total, subject to 1 F 1 (5) tx rx ack, subject to 1 total 1 total (6)

4 Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), 3) Acknowledgement Sncerty Value SACK FACK ACK, subject to 1 ACK 1 (7) SACK FACK Fnally usng these values total trust has been computed, whch nvolves the weghtng process. ach trust evaluaton factor has been assgned a weght. The weghts represents the mportance of each trust factor. The value wll be 0 for unmportant factor and 1 for most mportant factor. These weghts are dependent on the type of the applcatons of WSN. After the completon of ths process the trust value wll be calculated by the followng equaton. * F * * ACK T total, where 1,, 1 (8) Here, α s the weght adjustment for forwardng sncerty, β s the weght adjustment for nergy depleton and γ s the weght adjustment for acknowledgement sncerty. If the energy value s lower than a specfed threshold, than the node wll be excluded from the forwarder lst, because ths node s not able to forward data packets. And the value of trust, T n ths case wll be -1. As each sensor n nvolved n calculatng the trust value n the network, some malcous nodes whch are creatng problems lke nconsstent data, malcous data, and blockng data packets at one pont can be detected and reported n ths step. IV. XPRIMNTAL RSULTS AND ANALYSIS Ths secton presents the securty and energy performance of proposed trust aware opportunstc routng metrc. The metrc has been appled n DSDV protocol and smple DSDV [29], Ad-hoc On Demand (AODV) [30] and modfed DSDV (proposed) has been tested n WSN scenaro. The securty performance comprses the average number of malcous nodes have encountered durng a transmsson. A specfc malcous rato has been gven n every smulaton. On the other hand, energy performance s calculated by checkng the energy effcency of each node after each successful or unsuccessful transmsson n the presence of malcous nodes. A. Smulaton Setup The smulatons has been carred out by usng MATLAB. The scenaro consdered over here contans sngle base staton wth statc sensor nodes n a feld area of 500 x 500 m. The transmsson has been consdered successful only when base staton receves the packet. Many experments has been conducted consderng sngle base staton and contnuous communcaton model wth N sensor nodes. The source has been chosen randomly, whch wll ntate the communcaton. Table 1 Smulaton Parameters Parameter Descrpton Area 500 x 500 m Range of Rado 200 m Number of Nodes Traffc Type CBR Packet Sze 127 bytes Data Rate 20 kbps SNR Threshold 10 Intal nergy 10.0 J lectronc nergy 50 * 10-9 J At a tme only one source node has been selected and t wll forward the data towards base staton usng multple hops. The smulaton wll termnate the sensors havng energy lower than joules. For physcal and data lnk layers, I framework has been chosen, whch perfectly fts for low data rate applcatons and t provdes long lfetme of batteres of nodes [31]. As mentoned n [31], constant bt rate traffc wth a data rate of 20 kbps wth a packet sze of 127 bytes has been smulated here. Table 1 shows the smulaton settngs n MATLAB. B. xpermental Results The number of nodes consdered here vares from 50 to 100 deployed n the smulaton area. One can deploy nodes n any feld of applcaton as the poston of nodes s random. Ths metrc can be appled to any applcaton of WSN. a) Safety Performance: The safety performance has been measured for three protocols.e. DSDV, AODV and modfed DSDV. The dfferent malcous nodes percentages (5%-20%) has been consdered durng smulaton. It has been assumed that as the malcous sensor nodes rato ncreases n the network, the dffculty n managng securty n route setup has been ncreases. It can be seen from fgure 1 that the average rsk level of modfed DSDV has been lower as compared to DSDV and AODV protocols. Ths s because, n AODV and DSDV whle choosng the next-hop for data transmsson do not consder the values of number of successful transmsson and node energy. When a malcous node s 2017, IJARCSS All Rghts Reserved Page 194

5 Average Rsk Level Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), selected as next-hop t wll not forward the packet or drop the packet. Ths malcous node wll be detected n modfed DSDV usng proposed trust aware metrc and wll be avoded for the next transmsson. Ths conclude that trust aware metrc can attan a hgh level of securty Average Rsk Level (5%-20% malcous nodes) No of Nodes Fgure 1: Average Rsk Level AVG Rsk_Proposed AVG Rsk_AODV AVG Rsk_DSDV From fgure 1 the average rsk level ncreases wth respect to ncrease n the number of malcous nodes n network. The rsk level for all three protocols ncrease as the malcous nodes ncrease n the network, because of the problem n choosng nodes as next-hop. very tme a malcous node drop the packet, there s a need of settng up route agan and retransmttng mssng packets. As the average rsk level n AODV and DSDV s hgh, we can conclude that, there s no securty has been consdered n the routng metrc of these protocols. b) nergy ffcency Performance: To test the energy performance of three protocols, general energy model has been consdered from our prevously publshed research paper [28]. Fgure 2 shows average energy cost for dfferent smulatons under dfferent malcous nodes ratos (5%-20%). It can be seen from the fgure 2 that modfed DSDV wth proposed metrc shows hgh energy effcency as compared to AODV and DSDV. AODV and DSDV shows poor performance n terms of energy effcency. Fgure 3 shows the average network lfetme whch vares wth number of nodes and the number of malcous nodes. Proposed metrc shows good performance n mantan good lfetme, but reduces n performance when the malcous nodes ncreases n the network. The energy effcency decreases because, f there are larger number of malcous nodes n the network, there wll be problems n route setup. The end-to-end delay wll be ncreases and also the path loss ncreases (fgure 4 and fgure 5) n ths case. Fgure 2: Average nergy Consumpton Fgure 3: Average Network Lfetme 2017, IJARCSS All Rghts Reserved Page 195

6 Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), Fgure 4: Average nd-to-nd Delay From overall results obtaned above t can be concluded that the proposed metrc works well wth DSDV n mantanng the safety and energy effcency n the network. Proposed metrc has advantages of equal energy load dstrbuton and mantanng securty, over exstng route setup metrcs used n AODV and DSDV. The only dsadvantage s that the end-to-end delay wll be hgh due to lttle computaton overhead. Fgure 5: Average Path Loss V. CONCLUSION AND FUTUR SCOP In ths paper, we have proposed a new trust and energy aware routng metrc and appled t to DSDV protocol. The routng metrc focuses on the trustworthness and energy effcency of the nodes n the network. The trustworthness can be computed as a factor of forwardng sncerty, energy cost and acknowledgement sncerty of a node. These factors are most essental for the survval and successful operaton of WSN n hostle envronment and malcous attacks. The routng metrc can be vewed as a composte metrc. It assgns weghts for energy, forwardng sncerty and acknowledgement sncerty of a node. If a node s not satsfyng n these three sncerty condtons, t wll not be consdered as next-hop for data transmsson. The route selecton has been mproved and false lnk falure notfcatons has been avoded. The smulaton results have shown the betterment of the proposed metrc n terms of safety and energy effcency. RFRNCS [1] Akyldz, I.F., and Kasmoglu, I.H.: Wreless sensor and actor networks: research challenges, Ad hoc networks, 2004, 2, (4), pp [2] Akyldz, I.F., Su, W., Sankarasubramanam, Y., and Cayrc,.: Wreless sensor networks: a survey, Computer networks, 2002, 38, (4), pp [3] Mohndru, V., and Sngh, Y.: ffcent Approach for Securng Message Communcaton n Wreless Sensor Networks from Node Clone Attack, Indan Journal of Scence and Technology, 2016, 9, (32), pp. 1-7 [4] Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y., and Pande, A.: SGOR: Secure and scalable geographc opportunstc routng wth receved sgnal strength n WSNs, Computer Communcatons, 2015, 59, pp [5] Shakh, R.A., Jameel, H., d'aurol, B.J., Lee, H., Lee, S., and Song, Y.-J.: Group-based trust management scheme for clustered wreless sensor networks, I transactons on parallel and dstrbuted systems, 2009, 20, (11), pp [6] Yao, L., Man, Y., Huang, Z., Deng, J., and Wang, X.: Secure Routng based on Socal Smlarty n Opportunstc Networks, I Transactons on Wreless Communcatons, 2016, 15, (1), pp , IJARCSS All Rghts Reserved Page 196

7 Ran Internatonal Journal of Advanced Research n Computer Scence and Software ngneerng 7(1), [7] Yao, Z., Km, D., and Doh, Y.: PLUS: Parameterzed and localzed trust management scheme for sensor networks securty, n proceedngs of Internatonal Conference on Moble Ad Hoc and Sensor Systems (I, 2006), Vancover, BC, pp [8] Zhou, Y., Tan, X., He, X., Qn, G., and X, H.: Secure Opportunstc Routng for Wreless Mult-Hop Networks Usng LPG and Dgtal Sgnature, Informaton Assurance and Securty Letters 1 (2010), 2010, pp [9] Kumar, N., and Sngh, Y.: Routng Protocols n Wreless Sensor Networks, n Nranjan, K.R., and Ashok Kumar, T. (ds.): Handbook of Research on Advanced Wreless Sensor Network Applcatons, Protocols, and Archtectures (IGI Global, 2016), pp [10] Bswas, S., and Morrs, R.: xor: opportunstc mult-hop routng for wreless networks, n Proceedngs of 35 th SIGCOMM Computer Communcaton Revew (ACM, 2005), Phladelpha, Pennsylvana, USA, pp [11] Koksal, C.., and Balakrshnan, H.: Qualty-aware routng metrcs for tme-varyng wreless mesh networks, I Journal on Selected Areas n Communcatons, 2006, 24, (11), pp [12] Zhong, Z., Wang, J., Nelakudt, S., and Lu, G.-H.: On selecton of canddates for opportunstc anypath forwardng, ACM SIGMOBIL Moble Computng and Communcatons Revew, 2006, 10, (4), pp. 1-2 [13] Hsu, C.-J., Lu, H.-I., and Seah, W.K.G.: Opportunstc routng : A revew and the challenges ahead, Computer Networks, 2011, 55, (15), pp [14] Lu, K., Abu-Ghazaleh, N., and Kang, K.-D.: Locaton verfcaton and trust management for reslent geographc routng, Journal of Parallel and Dstrbuted Computng, 2007, 67, (2), pp [15] Boukerche, A., and Darehshoorzadeh, A.: Opportunstc routng n wreless networks: Models, algorthms, and classfcatons, ACM Computng Surveys (CSUR), 2015, 47, (2), pp. 22 [16] Dubos-Ferrare, H., Grossglauser, M., and Vetterl, M.: Valuable detours: Least-cost anypath routng, I/ACM Transactons on Networkng, 2011, 19, (2), pp [17] Rozner,., Seshadr, J., Mehta, Y.A., and Qu, L.: SOAR: Smple opportunstc adaptve routng protocol for wreless mesh networks, I Transactons on Moble Computng, 2009, 8, (12), pp [18] Hu-hu, D., Ya-jun, G., Zhong-qang, Y., and Hao, C.: A wreless sensor networks based on mult-angle trust of node, n Proceedngs of Internatonal Forum on Informaton Technology and Applcatons (I, 2009), Chengdu, Chna, pp [19] Ganerwal, S., Balzano, L.K., and Srvastava, M.B.: Reputaton-based framework for hgh ntegrty sensor networks, ACM Transactons on Sensor Networks (TOSN), 2008, 4, (3), pp. 15 [20] Mchard, P., and Molva, R.: Core: a collaboratve reputaton mechansm to enforce node cooperaton n moble ad hoc networks : Advanced communcatons and multmeda securty (Sprnger, 2002), pp [21] He, Q., Wu, D., and Khosla, P.: SORI: a secure and objectve reputaton-based ncentve scheme for ad-hoc networks, n Proceedngs of Wreless communcatons and networkng conference (I, 2004), Atlanta, GA, USA, pp [22] Saleh, M., Boukerche, A., Darehshoorzadeh, A., and Mammer, A.: Towards a novel trust-based opportunstc routng protocol for wreless networks, Wreless Networks, 2016, 22, (3), pp [23] Deng, H., Yang, Y., Jn, G., Xu, R., and Sh, W.: Buldng a trust-aware dynamc routng soluton for wreless sensor networks, n Proceedngs of Globecom Workshops (I, 2010), Mam, Florda, USA, pp [24] Maarouf, I., Baroud, U., and Naseer, A.R.: ffcent montorng approach for reputaton system-based trustaware routng n wreless sensor networks, IT communcatons, 2009, 3, (5), pp [25] Gong, P., Chen, T.M., and Xu, Q.: TARP: An nergy ffcent Trust-Aware Routng Protocol for Wreless Sensor Networks, Journal of Sensors, 2015, 2015 [26] Adnan, A., Kamalrulnzam Abu, B., Muhammad Ibrahm, C., and Abdul Waheed, K.: A Secure Routng Protocol wth Trust and nergy Awareness for Wreless Sensor Network, Mob. Netw. Appl., 2016, 21, (2), pp [27] Vams, P.R., and Kant, K.: Trust and Locaton-Aware Routng Protocol for Wreless Sensor Networks, IT Journal of Research, 2016, 63, pp [28] Kumar, N., and Sngh, Y.: An nergy ffcent Opportunstc Routng Metrc for Wreless Sensor Networks, Indan Journal of Scence and Technology, 2016, 9, (32), pp. 1-7 [29] Perkns, C.., and Bhagwat, P.: Hghly dynamc destnaton-sequenced dstance-vector routng (DSDV) for moble computers, n Proceedngs of SIGCOMM computer communcaton revew (ACM, 1994), New York, USA, pp [30] Perkns, C., Beldng-Royer,., and Das, S.: Ad hoc on-demand dstance vector (AODV) routng, No. RFC 3561, 2003 [31] Chang, J.-H., and Tassulas, L.: nergy conservng routng n wreless ad-hoc networks, n Nneteenth Annual Jont Conference of the I Computer and Communcatons Socetes (I, 2000), Tel Avv, Israel, pp , IJARCSS All Rghts Reserved Page 197

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks 414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of

More information

Clustering in Wireless Multimedia Sensor Networks Using Spectral Graph Partitioning

Clustering in Wireless Multimedia Sensor Networks Using Spectral Graph Partitioning Int. J. Communcatons, Network and System Scences, 2013, 6, 128-133 http://dx.do.org/10.4236/jcns.2013.63015 Publshed Onlne March 2013 (http://www.scrp.org/journal/jcns) Clusterng n Wreless Multmeda Sensor

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks

A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks 009 Thrd Internatonal Conference on Sensor Technologes and Applcatons A Varable Threats Based Self-Organzaton Scheme for Wreless Sensor Networks Jan Zhong School of Computer Scence and Informaton Technology

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks*

Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks* Wreless Sensor Network, 2010, 2, 528-537 do:10.4236/wsn.2010.27065 Publshed Onlne July 2010 (http://www.scrp.org/journal/wsn) Contenton-Based Beaconless Real-Tme Routng Protocol for Wreless Sensor Networks*

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Classification Method in Integrated Information Network Using Vector Image Comparison

Classification Method in Integrated Information Network Using Vector Image Comparison Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com Classfcaton Method n Integrated Informaton Network Usng Vector Image Comparson Zhou Yuan Guangdong Polytechnc Normal Unversty

More information

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks Smulator for Energy Effcent Clusterng n Moble Ad Hoc Networks Amt Kumar 1 Dhrendra Srvastav 2 and Suchsmta Chnara 3 Department of Computer Scence and Engneerng, Natonal Insttute of Technology, Rourkela,

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network

A Reliable and Real-Time AggregationAaware Data Dissemination in a Chain- Based Wireless Sensor Network SENSORCOMM 2012 : The Sxth Internatonal Conference on Sensor Technologes and Applcatons A Relable and Real-Tme AggregatonAaware Data Dssemnaton n a Chan- Based Wreless Sensor Network Zahra Taghkhak, Nrvana

More information

Priority Enabled Transport Layer Protocol for Wireless Sensor Network

Priority Enabled Transport Layer Protocol for Wireless Sensor Network 2010 IEEE 24th Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops Prorty Enabled Transport Layer Protocol for Wreless Sensor Network 1 Atf Sharf, 2 Vdyasagar Potdar Dgtal

More information

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN

Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN Ensurng Basc Securty and Preventng Replay Attack n a Query Processng Applcaton Doman n WSN Amrta Ghosal 1, Subr Halder 1, Sanjb Sur 2, Avshek Dan 2, and Spra DasBt 2 1 Dept. of Comp. Sc. & Engg, Dr. B.

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

An approach to data Aggregation in wireless sensor network using Voronoi fuzzy clustering algorithm

An approach to data Aggregation in wireless sensor network using Voronoi fuzzy clustering algorithm Journal of Scentfc & Industral Research ol. 72, May 2013, pp. 287-293 An approach to data Aggregaton n wreless sensor network usng orono fuzzy clusterng algorthm S.Nthyakalyan 1* and S.Suresh Kumar 2 *1

More information

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks

QoS Aware Inter-Cluster Routing Protocol for IEEE Networks 215 17th UKSIM-AMSS Internatonal Conference on Modellng and Smulaton QoS Aware Inter-Cluster outng Protocol for IEEE 82.15.4 Networks Ahmed Ben Saleh Dept. Computer Scence &IT Unversty of Bsha Bsha K.

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Applied Mathematics. Elixir Appl. Math. 84 (2015)

Applied Mathematics. Elixir Appl. Math. 84 (2015) 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) 3341-3349 Avalable onlne at www.elxrpublshers.com (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) 3341-3349 Bayesan Inference

More information

Layer Based and Energy-Balanced Clustering Protocol for Wireless Sensor Network

Layer Based and Energy-Balanced Clustering Protocol for Wireless Sensor Network Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Layer Based and nergy-balanced Clusterng Protocol for Wreless Sensor Network 1 Yu HU, 2 Shu HAN 1 Measurng and Controllng Technology Insttute,

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks Internatonal Conference on Dstrbuted Computng Systems ICDCS 2003 : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Prioritizing Information for Achieving QoS Control in WSN

Prioritizing Information for Achieving QoS Control in WSN 2010 24th IEEE Internatonal Conference on Advanced Informaton Networkng and Applcatons Prortzng Informaton for Achevng os Control n WSN 1 Atf Sharf, 2 Vdyasagar Potdar Dgtal Ecosystems and Busness Intellgence

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. WP A Tree Based Response Tme Algorthm for Event Drven Wreless Sensor Networks 1 Itu Sngdh, 2 Saurabh Kumar 1 Department of Computer Scence and Engneerng, Brla Insttute of Technology, Mesra, Ranch, Jharkhand,

More information

Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network

Research Article QPRD: QoS-Aware Peering Routing Protocol for Delay-Sensitive Data in Hospital Body Area Network Moble Informaton Systems Volume 15, Artcle ID 153232, 16 pages http://dx.do.org/1.1155/15/153232 Research Artcle : QoS-Aware Peerng Routng Protocol for Delay-Senstve Data n Hosptal Body Area Network Zahoor

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal

More information

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network*

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network* A Secure Hybrd Wreless Mesh Protocol for 802.11s Mesh Network* Md. Sharful Islam, Young Jg Yoon, Md. Abdul Hamd, and Choong Seon Hong** Department of Computer Engneerng, Kyung Hee Unversty, Republc of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION

IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION Gholamreza Farahan Department of Electrcal Engneerng and Informaton Technology, Iranan Research

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks Sensors 2015, 15, 14016-14044; do:10.3390/s150614016 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle On Desgnng Thermal-Aware Localzed QoS Routng Protocol for n-vvo Sensor Nodes n

More information

A Super Peer-based Reputation Scheme for Mobile Computing Environments

A Super Peer-based Reputation Scheme for Mobile Computing Environments A Super Peer-based Reputaton Scheme for Moble Computng Envronments Xu Wu Department of Computer Scence, X an Unversty of Posts and Telecommuncatons, X an 710121, Chna Emal: xrdz2006@163.com Abstract Trust

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

A Spatiotemporal Communication Protocol for Wireless Sensor Networks

A Spatiotemporal Communication Protocol for Wireless Sensor Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0195-1003.R2 1 A Spatotemporal Communcaton Protocol for Wreless Sensor Networks Tan He, Member, IEEE, John A. Stankovc, Fellow, IEEE, Chenyang

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information