keyboard_arrow_up
Top Read Research Articles in the Field of Wireless & Mobile Networks @ 2019

AN OVERVIEW OF AUTO-CONFIGURATION PROTOCOLS IN MOBILE AD HOC WIRELESS MULTI-HOP NETWORK

    Adel R. Alharbi Computer Engineering Department, University of Tabuk, Saudi Arabia

    ABSTRACT

    An ad hoc wireless IP multi-hop network is a collection of wireless IP protocol capable nodes that start in an unknown physical formation in the vicinity of a wireless IP portal to a wired IP network. While some wireless nodes might be in radio (wireless) range of the portal, other nodes might only be in radio range of one or more other nodes that in turn may in range of thenportal and/or other wireless nodes. IP data-grams would travel from one node to another until the data-gram is delivered to the portal or the destination node. All wireless nodes are assumed to be one or more hop away from the wireless IP portal. This paper reviews an autoconfigure method of a mobile ad hoc network and to route IP traffic using existing mobile adhoc network routing protocols. This method have the best characteristics in protocol overhead,robustness, convergence time, and scalability. The optimal mobile ad hoc network routing protocol can be chosen which best meets these characteristics for the given topology andoperational profile. Finally, this method will efficiently use the address space allotted to the DHCP server.

    KEYWORDS

    Wireless LAN, communication systems routing, mobile communications, auto-configuration protocols, MANET


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91804.pdf


    9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)


IMPLEMENTATION OF VLAN VIA WIRELESS NETWORKS USING OPNET MODELER

    Tareq Al-Khraishi and Muhannad Quwaider ,Jordan University of Science and Technology, Jordan

    ABSTRACT

    A VLAN is a logical rather than physical connection that allows grouping hosts together in the same broadcast domain, so that packets are only delivered to ports that are combined to thesame VLAN. By characteristic VLAN network, we can improve efficiency of wireless network and save bandwidth. Furthermore, implementing VLAN greatly improves wireless networksecurity by decreasing the number of hosts that receive copies of frames broadcasted byswitches, so hosts holding critical data are kept on a separate VLAN. This paper compareswireless network with wireless network having VLAN deployment. The proposed Network is evaluated in terms of average throughput and delay using file transfer in heavy traffic and web browsing applications. The simulation was carried out by employing OPNET 14.5 modelersimulation and the results show that the use of VLAN via wireless network had improved the performance by decreasing the traffic resulting in minimizing delay time. In addition,implementing VLAN reduces the network throughput because the traffic that is received and forwarded has a positive relationship with throughput. Furthermore, we investigated toimprove the throughput in a wireless VLAN network by using adhoc routing protocols.Evaluation, comparison of broad adhoc routing protocols like AODV, DSR, OLSR, TORA and GPR are conducted in order to show the effect of the proposed VLAN on the performance results, like throughput and delay.

    KEYWORDS

    WLAN, OPNET, AODV, Throughput, VLAN, Routing Protocols, Access Point


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91805.pdf


    9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)


A MIXED LOGIN SCHEME PERFORMED ON MOBILE DEVICE TO RESIST MULTIPLE ATTACK

    Jie Wan1, Liang Liu1, Dai Hua2 and Wei Liu3 , 1NanJing University of Aeronautics and Astronautics, China ,2Nanjing University of Post &Telecommunications, China 3Nanjing Institute of technicians, China

    ABSTRACT

    Nowadays text-based password has been widely used in our daily life. However, rather thanchoose a complex text password people prefer to use a brief password so that they canremember it easily. Moreover, with the rapid increasing use of mobile applications, people ofteninput passwords in public. Attacker can perform shoulder surfing attack to observe the password directly with naked eyes or some video record devices. In order to resist the shoulder surfing attack, a number of authentication schemes based on graph have been proposed.However, graph-based password is totally different from text-based password. It's difficult for users to memorize two different kinds of passwords. In this paper, we propose a mixed login scheme called MixedKey which mixes graphic and traditional textual password. The loginindicator in the scheme is randomly and safely generated for each login. MixedKey divides eachpassword into characters, which connects graphic and text-based password. Users could loginour system in both public and private situations with just one password. We also implementedMixedKey and conducted experiments to measure the memorability and usability. The resultsshow MixedKey outperforms the existing schemes.

    KEYWORDS

    Shoulder Surfing Attack, Graph-based Password, Text-based Password, Login Scheme


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91811.pdf


    9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019)


PROTECTING LEGACY MOBILE MEDICAL DEVICES USING A WEARABLE SECURITY DEVICE

    Vahab Pournaghshband1 and Peter Reiher2 1University of San Francisco, USA 2University of California,USA

    ABSTRACT

    The market is currently sated with mobile medical devices and new technology is continuously emerging. Thus, it is costly, and in some cases impractical, to replace these devices for new ones withgreater security. In this paper, we present the implementation of a prototype for Personal SecurityDevice—a self-contained, specialized wearable device that augments security to existing mobile medicaldevices. The main research challenge for, and hence the state of the art of, the proposed hardwaredesign is that the device, to work with legacy devices, must require no changes to either the medicaldevice or its monitoring software. This requirement is essential since we aim to protect already existingdevices, as making modifications to the device or its proprietary software often impossible orimpractical (e.g., closed source executables and implantable medical devices). Through performanceevaluation of this prototype, we confirmed the feasibility of having a special-purpose hardware withlimited computational and memory resources to perform necessary security operations.

    KEYWORDS

    Wireless medical device security, Man-in-the-middle attack


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91716.pdf


    9th International Conference on Advances in Computing and Information Technology (ACITY 2019)


A SYSTEMATIC EVALUATION OF MANETROUTING PROTOCOLS OVER UDP AND TCPIN MULTI-HOP WIRELESS NETWORK

    1Adebayo Seyi1 and Ogunseyi Taiwo2 ,1China University of Mining and Technology, China , 2Communication University of China, , China

    ABSTRACT

    There are genuine concerns for the right transport connection to be deployed on a particular routing protocol in order to have a reliable, fast and robust communication in spite of the size and the dynamics of the mobile ad-hoc network (MANET) topology. This paper comparatively studies the individual implementation of reactive and proactive protocols on both UDP and TCP transport connection using packet delivery ratio (PDR), throughput, end to end delay and delay variation (jitter) as quality of service (QoS) metrics.We studied the combination of both the transport connection and routing protocol that willdeliver the best QoS in simple and complex network scenarios with source and destinationnodes fixed and the intermediate nodes randomly moving throughout the simulation time. Moreso, the intrinsic characteristics of the routing protocols regarding the QoS metrics andtransport connection are studied. Forty simulations were run for simple and complex multi-hopnetwork models and the results were analyzed and presented.

    KEYWORDS

    MANET, Proactive, Reactive, QoS, UDP, TCP


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91717.pdf


    9th International Conference on Advances in Computing and Information Technology (ACITY 2019)


A LOW COST METHANE ABSORPTIONFUELING SYSTEM IN WIRELESS SENSORNETWORKS USING SBC-MS

    A.Rehash Rushmi Pavitra1and Dr. E. Srie Vidhya Janani2 ,1Anna University Regional Campus, India

    ABSTRACT

    The isolated accessible Methane (CH4) Absorption Fueling System (MAFS) is matured based on the mechanics of Wireless Sensor Network (WSN) comprised of gas sensing capable motes complementing a MAFS-WSN. Discrete routing protocols have been designed earlier for data collection in both compatible and divergent networks. This research presents a novelScheduling based Clustering (SBC) with Mobile Sink (MS) strategy (SBC-MS) whichsupplements data collection in MAFS-WSN. The SBC-MS strategy attempts to exploit the vital parameters of energy and distance in selecting the appropriate cluster head that well suitsMAFS-WSN in reliable gas detection. The MSs are exploited to reduce the energy expenditure in data communication. Extensive experimentations have been carried out with the proposed SBC-MS to ensure the QOS of MAFS-WSN in terms of schedulability and reliability. Thesimulation results prove that SBC-MS outperforms the earlier clustering technique M-LEACH in terms of network lifetime, energy consumption, end-to-end delay and data rate.

    KEYWORDS

    Methane Absorption Fueling system, Gas Sensing Capable Motes, Mobile Sinks, Scheduling and Clustering.


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91503.pdf


    First International Conference on Secure Reconfigurable Architectures & Intelligent Computing


METHODOLOGY TO EVALUATE WSNSIMULATORS: FOCUSING ON ENERGY CONSUMPTION AWARENESS

    Michel Bakni1, Luis Manuel Moreno Chac´on2, Yudith Cardinale2 , GuillaumeTerrasson1, and Octavian Curea1 1Univ. Bordeaux, France 2Universidad Sim´on Bol´ıvar, Venezuela

    ABSTRACT

    Nowadays, there exists a large number of available network simulators, that differ in their design, goals, and characteristics. Users who have to decide which simulator is the most appropriate for their particular requirements, are today lost, faced with a panoply of disparate anddiverse simulators. Hence, it is obvious the need for establishing guidelines that support users inthe tasks of selecting and customizing a simulator to suit their preferences and needs. In previousworks, we proposed a generic and novel methodological approach to evaluate network simulators,considering a set of qualitative and quantitative criteria. However, it lacks criteria related to Wireless Sensor Networks (WSN). Thus, the aim of this work is three fold: (i) extend the previousproposed methodology to include the evaluation of WSN simulators, such as energy consumptionmodelling and scalability; (ii) elaborate a study of the state of the art of WSN simulators, withthe intention of identifying the most used and cited in scientific articles; and (iii) demonstrate thesuitability of our novel methodology by evaluating and comparing three of the most cited simulators.Our novel methodology provides researchers with an evaluation tool that can be used to describeand compare WSN simulators in order to select the most appropriate one for a given scenario.

    KEYWORDS

    Methodology, Simulators, Wireless Sensors Networks, Energy Consumption.


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91327.pdf


    6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019)


FINDING MAXIMAL LOCALIZABLE REGIONIN WIRELESS SENSOR NETWORKS BYMERGING RIGID CLUSTERS

    Saroja Kanchi Department of Computer Science, Kettering University, Flint, MI, USA

    ABSTRACT

    Localization of Wireless Sensor Network (WSN) is the problem of finding the geo-locations ofsensors in a sensor network deployed in various applications. Given the prolification ofsensors in various applications, the localization and tracking of sensors have receivedconsiderable attention. Properties of rigidity and flexibility of the underlying graph of theWSN have been studied as a means of determining the localizability of the nodes in the WSN.In this paper, we present a new 3-merge technique for merging three rigid clusters of anetwork graph, into larger rigid cluster and we use this algorithm for finding maximallocalizable regions within the WSN. We provide simulation results on random deploymentsof WSN to prove that this technique outperforms previously known algorithms for findingmaximal localizable subregions. Moreover, simulation results show that the number ofanchors needed to localize the entire WSN decreases due to finding large localizable regions.

    KEYWORDS

    Wireless Sensor Network, localization, rigidity, cluster, merging


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91326.pdf


    6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019)


MULTI-VARIABLE LINEAR REGRESSIONBASED PREDICTION OF A COMPUTATIONALLYHEAVY LINK STABILITY METRIC FOR MOBILESENSOR NETWORKS

    Natarajan Meghanathan, Jackson State University, USA

    ABSTRACT

    Until now, we were determining stable data gathering (DG) trees for mobile sensor networks (MSNs) using a link stability metric (computationally-light or computationally-heavy) that is directly computed on the egocentric edge network. Among such DG trees, the BPI' (complementof bipartivity index)-based DG trees were observed to be the most stable, but the BPI' metric isalso computationally-heavy. Hence, we seek to build a multi-variable linear regression model topredict the BPI' values for the egocentric networks of edges using three computationally-lightmetrics (neighborhood overlap: NOVER, one-hop two-hop neighborhood: OTH, and normalizedneighbor degree: NND) that are also computed on the egocentric edge networks. The trainingand testing are conducted as part of a single simulation run (i.e., in-situ). The training datasetcomprises of the BPI', NOVER, OTH and NND values of randomly sampled egocentric edgenetworks during the first phase of the simulation (1/5th of the total simulation time). We observethe R-square values for the prediction to be above 0.85 for both low density and high densitynetworks. We also observe the lifetimes of the predicted BPI'-based DG trees to be 87-92% and55-75% of the actual BPI'-based DG trees for low-moderate and moderate-high densitynetworks respectively.

    KEYWORDS

    Multi-variable Regression, Bipartivity Index, Computationally-Light, Computationally-Heavy,Mobile Sensor Networks, Data Gathering Tree


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit91103.pdf


    5th International Conference on Computer Science, Information Technology (CSITEC 2019)


INTRANET SECURITY USING A LAN PACKETSNIFFER TO MONITOR TRAFFIC

    Ogbu N. Henry1 and Moses Adah Agana2 , 1Ebonyi State University, Nigeria ,2University of Calabar, Nigeria

    ABSTRACT

    This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented usingfive computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). The outcome can aid network administrators to control Intranet access and provide security.

    KEYWORDS

    Packet, Sniffer, Protocol, Address, Network, Frame


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit90806.pdf


    9th International Conference on Computer Science and Information Technology (CCSIT 2019)


ENERGY SPARING OF THE LEACHCOMMUNICATION MECHANISM INHETEROGENEOUS WSN

    Zoltán Gál1 and Mohamed Amine Korteby 2 1,2 University of Debrecen, Hungary

    ABSTRACT

    In current years, there have been a large progress in Wireless Sensor Networks (WSN) due to their development in term of hardware and cost reduction. Plenty of routing protocols have been proposed and developed depending on the application and network architecture. One of the most efficient energy management of the wireless sensor networknodes is provided by the LEACH (Low Energy Adaptive Clustering Hierarchy) mechanism. This hierarchical protocol uses cluster head function of the nodes to aggregate and forward the messages from the cluster members to the Sink node. Each node decides to become cluster head stochastically in each epoch time intervals. Nodes have enough energy to reach directly through radio channel any ofthe nearest cluster nodes, as well as the sink node. Optimization algorithm is required to provide efficient energy consumption on the WSN clusters level. A node being cluster head in the actual epoch time can repeat this function just with a probability p in time. Classical nodes find the nearest cluster head to minimize the transmission energy consumption and use time division multiple access method (TDMA)to send the radio frames in each epoch time. In this paper we use own developed simulation method and software to analyze the remaining energy process in time of the whole WSN network and the number of forwarded frames in function of the probability p for a set of nodes having heterogeneous levels of the initial energy.

    KEYWORDS

    Internet of Things (IoT), Wireless Sensor Network(WSN), Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, radio communication, energy sparing, stochastic process


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit90406.pdf


    8th International Conference on Advanced Computer Science and Information Technology (ICAIT 2019)


IMPLEMENTATION OF MACHINE LEARNINGSPECTRUM SENSING FOR COGNITIVE RADIOAPPLICATIONS

    Mohamed El-Tarhuni1, Khaled Assaleh2, and Firas Kiftaro1 1American University of Sharjah, UAE 2Ajman University, UAE

    ABSTRACT

    In this paper, a cognitive radio system is implemented using National Instruments (NI) Universal Software Radio Peripheral (USRP) devices. The implemented system provides a working prototype based on real data generated and collected by an experimental laboratory setup to compare the performance of spectrum sensing algorithms based on energy detection and polynomial classifier channel sensing techniques. For a sensing time interval ranging from 0.05 ms to 5ms, the experimental results show that the polynomial classifier has a better performance compared to the conventional energy detector in terms of the misclassification rate, especially at lower SNR values.

    KEYWORDS

    Cognitive Radio, Spectrum Dynamic Access, Spectrum Sensing, Polynomial Classifier, EnergyDetection, USRP


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit90405.pdf


    8th International Conference on Advanced Computer Science and Information Technology (ICAIT 2019)


ENERGY SPARING OF THE LEACHCOMMUNICATION MECHANISM INHETEROGENEOUS WSN

    Zoltán Gál1 and Mohamed Amine Korteby2 1,2 University of Debrecen, Hungary

    ABSTRACT

    In current years, there have been a large progress in Wireless Sensor Networks (WSN) due to their development in term of hardware and cost reduction. Plenty of routing protocols have been proposed and developed depending on the application and network architecture. One of the most efficient energy management of the wireless sensor networknodes is provided by the LEACH (Low Energy Adaptive Clustering Hierarchy) mechanism. This hierarchical protocol uses cluster head function of the nodes to aggregate and forward the messages from the cluster members to the Sink node. Each node decides to become cluster head stochastically in each epoch time intervals. Nodes have enough energy to reach directly through radio channel any ofthe nearest cluster nodes, as well as the sink node. Optimization algorithm is required to provide efficient energy consumption on the WSN clusters level. A node being cluster head in the actual epoch time can repeat this function just with a probability p in time. Classical nodes find the nearest cluster head to minimize the transmission energy consumption and use time division multiple access method (TDMA)to send the radio frames in each epoch time. In this paper we use own developed simulation method and software to analyze the remaining energy process in time of the whole WSN network and the number of forwarded frames in function of the probability p for a set of nodes having heterogeneous levels of the initial energy.

    KEYWORDS

    Internet of Things (IoT), Wireless Sensor Network(WSN), Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, radio communication, energy sparing, stochastic process.


    For More Details :
    https://aircconline.com/csit/papers/vol9/csit90406.pdf


    8th International Conference on Advanced Computer Science and Information Technology (ICAIT 2019)


ARRAY FACTOR IN CURVED MICROSTRIPLINEARRAY ANTENNA FOR RADARCOMMUNICATION SYSTEMS

    Putu Artawan1,2 Yono Hadi Pramono1, Mashuri1 Josaphat T. SriSumantyo3 , 1Institut Teknologi Sepuluh, Indonesia , 2Faculty of Mathematics and Natural Sciences, Ganesha 3Chiba University, Japan

    ABSTRACT

    This paper chiefly deals with techniques of stereo vision, particularly focuses on the procedure of stereo matching. In addition, the proposed approach deals with detection of the regions of occlusion. Prior to carrying out stereo matching, image segmentation is conducted in order to achieve precise matching results. In practice, in stereo vision, matching algorithm sometimes suffers from insufficient accuracy if occlusion is inherent with the scene of interest. Searching the matching regions is conducted based on cross correlation and based on finding a region of the minimum mean square error of the difference between the areas of interest defined in matching window. Middlebury dataset is used for experiments, comparison with the existed results, and the proposed algorithm shows better performance than the existed matching algorithms. To evaluate the proposed algorithm, we compare the result of disparity to the existed ones.

    KEYWORDS

    Array, Curved microstripline, Radar communication, C-Band, X-Band


    For More Details :
    https://airccj.org/CSCP/vol9/csit90314.pdf


    7th International Conference on Signal Image Processing and Multimedia (SIPM 2019)






menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close