AN OVERVIEW OF AUTO-CONFIGURATION PROTOCOLS IN MOBILE AD HOC WIRELESS MULTI-HOP NETWORK
Adel R. Alharbi Computer Engineering Department, University of Tabuk, Saudi Arabia
An ad hoc wireless IP multi-hop network is a collection of wireless IP protocol capable nodes that start in an unknown physical formation in the vicinity of a wireless IP portal to a wired IP network. While some wireless nodes might be in radio (wireless) range of the portal, other nodes might only be in radio range of one or more other nodes that in turn may in range of thenportal and/or other wireless nodes. IP data-grams would travel from one node to another until the data-gram is delivered to the portal or the destination node. All wireless nodes are assumed to be one or more hop away from the wireless IP portal. This paper reviews an autoconfigure method of a mobile ad hoc network and to route IP traffic using existing mobile adhoc network routing protocols. This method have the best characteristics in protocol overhead,robustness, convergence time, and scalability. The optimal mobile ad hoc network routing protocol can be chosen which best meets these characteristics for the given topology andoperational profile. Finally, this method will efficiently use the address space allotted to the DHCP server.
Wireless LAN, communication systems routing, mobile communications, auto-configuration protocols, MANET
For More Details :
https://aircconline.com/csit/papers/vol9/csit91804.pdf
IMPLEMENTATION OF VLAN VIA WIRELESS NETWORKS USING OPNET MODELER
Tareq Al-Khraishi and Muhannad Quwaider ,Jordan University of Science and Technology, Jordan
A VLAN is a logical rather than physical connection that allows grouping hosts together in the same broadcast domain, so that packets are only delivered to ports that are combined to thesame VLAN. By characteristic VLAN network, we can improve efficiency of wireless network and save bandwidth. Furthermore, implementing VLAN greatly improves wireless networksecurity by decreasing the number of hosts that receive copies of frames broadcasted byswitches, so hosts holding critical data are kept on a separate VLAN. This paper compareswireless network with wireless network having VLAN deployment. The proposed Network is evaluated in terms of average throughput and delay using file transfer in heavy traffic and web browsing applications. The simulation was carried out by employing OPNET 14.5 modelersimulation and the results show that the use of VLAN via wireless network had improved the performance by decreasing the traffic resulting in minimizing delay time. In addition,implementing VLAN reduces the network throughput because the traffic that is received and forwarded has a positive relationship with throughput. Furthermore, we investigated toimprove the throughput in a wireless VLAN network by using adhoc routing protocols.Evaluation, comparison of broad adhoc routing protocols like AODV, DSR, OLSR, TORA and GPR are conducted in order to show the effect of the proposed VLAN on the performance results, like throughput and delay.
WLAN, OPNET, AODV, Throughput, VLAN, Routing Protocols, Access Point
For More Details :
https://aircconline.com/csit/papers/vol9/csit91805.pdf
A MIXED LOGIN SCHEME PERFORMED ON MOBILE DEVICE TO RESIST MULTIPLE ATTACK
Jie Wan1, Liang Liu1, Dai Hua2 and Wei Liu3 , 1NanJing University of Aeronautics and Astronautics, China ,2Nanjing University of Post &Telecommunications, China 3Nanjing Institute of technicians, China
Nowadays text-based password has been widely used in our daily life. However, rather thanchoose a complex text password people prefer to use a brief password so that they canremember it easily. Moreover, with the rapid increasing use of mobile applications, people ofteninput passwords in public. Attacker can perform shoulder surfing attack to observe the password directly with naked eyes or some video record devices. In order to resist the shoulder surfing attack, a number of authentication schemes based on graph have been proposed.However, graph-based password is totally different from text-based password. It's difficult for users to memorize two different kinds of passwords. In this paper, we propose a mixed login scheme called MixedKey which mixes graphic and traditional textual password. The loginindicator in the scheme is randomly and safely generated for each login. MixedKey divides eachpassword into characters, which connects graphic and text-based password. Users could loginour system in both public and private situations with just one password. We also implementedMixedKey and conducted experiments to measure the memorability and usability. The resultsshow MixedKey outperforms the existing schemes.
Shoulder Surfing Attack, Graph-based Password, Text-based Password, Login Scheme
For More Details :
https://aircconline.com/csit/papers/vol9/csit91811.pdf
PROTECTING LEGACY MOBILE MEDICAL DEVICES USING A WEARABLE SECURITY DEVICE
Vahab Pournaghshband1 and Peter Reiher2 1University of San Francisco, USA 2University of California,USA
The market is currently sated with mobile medical devices and new technology is continuously emerging. Thus, it is costly, and in some cases impractical, to replace these devices for new ones withgreater security. In this paper, we present the implementation of a prototype for Personal SecurityDevice—a self-contained, specialized wearable device that augments security to existing mobile medicaldevices. The main research challenge for, and hence the state of the art of, the proposed hardwaredesign is that the device, to work with legacy devices, must require no changes to either the medicaldevice or its monitoring software. This requirement is essential since we aim to protect already existingdevices, as making modifications to the device or its proprietary software often impossible orimpractical (e.g., closed source executables and implantable medical devices). Through performanceevaluation of this prototype, we confirmed the feasibility of having a special-purpose hardware withlimited computational and memory resources to perform necessary security operations.
Wireless medical device security, Man-in-the-middle attack
For More Details :
https://aircconline.com/csit/papers/vol9/csit91716.pdf
A SYSTEMATIC EVALUATION OF MANETROUTING PROTOCOLS OVER UDP AND TCPIN MULTI-HOP WIRELESS NETWORK
1Adebayo Seyi1 and Ogunseyi Taiwo2 ,1China University of Mining and Technology, China , 2Communication University of China, , China
There are genuine concerns for the right transport connection to be deployed on a particular routing protocol in order to have a reliable, fast and robust communication in spite of the size and the dynamics of the mobile ad-hoc network (MANET) topology. This paper comparatively studies the individual implementation of reactive and proactive protocols on both UDP and TCP transport connection using packet delivery ratio (PDR), throughput, end to end delay and delay variation (jitter) as quality of service (QoS) metrics.We studied the combination of both the transport connection and routing protocol that willdeliver the best QoS in simple and complex network scenarios with source and destinationnodes fixed and the intermediate nodes randomly moving throughout the simulation time. Moreso, the intrinsic characteristics of the routing protocols regarding the QoS metrics andtransport connection are studied. Forty simulations were run for simple and complex multi-hopnetwork models and the results were analyzed and presented.
MANET, Proactive, Reactive, QoS, UDP, TCP
For More Details :
https://aircconline.com/csit/papers/vol9/csit91717.pdf
A LOW COST METHANE ABSORPTIONFUELING SYSTEM IN WIRELESS SENSORNETWORKS USING SBC-MS
A.Rehash Rushmi Pavitra1and Dr. E. Srie Vidhya Janani2 ,1Anna University Regional Campus, India
The isolated accessible Methane (CH4) Absorption Fueling System (MAFS) is matured based on the mechanics of Wireless Sensor Network (WSN) comprised of gas sensing capable motes complementing a MAFS-WSN. Discrete routing protocols have been designed earlier for data collection in both compatible and divergent networks. This research presents a novelScheduling based Clustering (SBC) with Mobile Sink (MS) strategy (SBC-MS) whichsupplements data collection in MAFS-WSN. The SBC-MS strategy attempts to exploit the vital parameters of energy and distance in selecting the appropriate cluster head that well suitsMAFS-WSN in reliable gas detection. The MSs are exploited to reduce the energy expenditure in data communication. Extensive experimentations have been carried out with the proposed SBC-MS to ensure the QOS of MAFS-WSN in terms of schedulability and reliability. Thesimulation results prove that SBC-MS outperforms the earlier clustering technique M-LEACH in terms of network lifetime, energy consumption, end-to-end delay and data rate.
Methane Absorption Fueling system, Gas Sensing Capable Motes, Mobile Sinks, Scheduling and Clustering.
For More Details :
https://aircconline.com/csit/papers/vol9/csit91503.pdf
METHODOLOGY TO EVALUATE WSNSIMULATORS: FOCUSING ON ENERGY CONSUMPTION AWARENESS
Michel Bakni1, Luis Manuel Moreno Chac´on2, Yudith Cardinale2 , GuillaumeTerrasson1, and Octavian Curea1 1Univ. Bordeaux, France 2Universidad Sim´on Bol´ıvar, Venezuela
Nowadays, there exists a large number of available network simulators, that differ in their design, goals, and characteristics. Users who have to decide which simulator is the most appropriate for their particular requirements, are today lost, faced with a panoply of disparate anddiverse simulators. Hence, it is obvious the need for establishing guidelines that support users inthe tasks of selecting and customizing a simulator to suit their preferences and needs. In previousworks, we proposed a generic and novel methodological approach to evaluate network simulators,considering a set of qualitative and quantitative criteria. However, it lacks criteria related to Wireless Sensor Networks (WSN). Thus, the aim of this work is three fold: (i) extend the previousproposed methodology to include the evaluation of WSN simulators, such as energy consumptionmodelling and scalability; (ii) elaborate a study of the state of the art of WSN simulators, withthe intention of identifying the most used and cited in scientific articles; and (iii) demonstrate thesuitability of our novel methodology by evaluating and comparing three of the most cited simulators.Our novel methodology provides researchers with an evaluation tool that can be used to describeand compare WSN simulators in order to select the most appropriate one for a given scenario.
Methodology, Simulators, Wireless Sensors Networks, Energy Consumption.
For More Details :
https://aircconline.com/csit/papers/vol9/csit91327.pdf
FINDING MAXIMAL LOCALIZABLE REGIONIN WIRELESS SENSOR NETWORKS BYMERGING RIGID CLUSTERS
Saroja Kanchi Department of Computer Science, Kettering University, Flint, MI, USA
Localization of Wireless Sensor Network (WSN) is the problem of finding the geo-locations ofsensors in a sensor network deployed in various applications. Given the prolification ofsensors in various applications, the localization and tracking of sensors have receivedconsiderable attention. Properties of rigidity and flexibility of the underlying graph of theWSN have been studied as a means of determining the localizability of the nodes in the WSN.In this paper, we present a new 3-merge technique for merging three rigid clusters of anetwork graph, into larger rigid cluster and we use this algorithm for finding maximallocalizable regions within the WSN. We provide simulation results on random deploymentsof WSN to prove that this technique outperforms previously known algorithms for findingmaximal localizable subregions. Moreover, simulation results show that the number ofanchors needed to localize the entire WSN decreases due to finding large localizable regions.
Wireless Sensor Network, localization, rigidity, cluster, merging
For More Details :
https://aircconline.com/csit/papers/vol9/csit91326.pdf
MULTI-VARIABLE LINEAR REGRESSIONBASED PREDICTION OF A COMPUTATIONALLYHEAVY LINK STABILITY METRIC FOR MOBILESENSOR NETWORKS
Natarajan Meghanathan, Jackson State University, USA
Until now, we were determining stable data gathering (DG) trees for mobile sensor networks (MSNs) using a link stability metric (computationally-light or computationally-heavy) that is directly computed on the egocentric edge network. Among such DG trees, the BPI' (complementof bipartivity index)-based DG trees were observed to be the most stable, but the BPI' metric isalso computationally-heavy. Hence, we seek to build a multi-variable linear regression model topredict the BPI' values for the egocentric networks of edges using three computationally-lightmetrics (neighborhood overlap: NOVER, one-hop two-hop neighborhood: OTH, and normalizedneighbor degree: NND) that are also computed on the egocentric edge networks. The trainingand testing are conducted as part of a single simulation run (i.e., in-situ). The training datasetcomprises of the BPI', NOVER, OTH and NND values of randomly sampled egocentric edgenetworks during the first phase of the simulation (1/5th of the total simulation time). We observethe R-square values for the prediction to be above 0.85 for both low density and high densitynetworks. We also observe the lifetimes of the predicted BPI'-based DG trees to be 87-92% and55-75% of the actual BPI'-based DG trees for low-moderate and moderate-high densitynetworks respectively.
Multi-variable Regression, Bipartivity Index, Computationally-Light, Computationally-Heavy,Mobile Sensor Networks, Data Gathering Tree
For More Details :
https://aircconline.com/csit/papers/vol9/csit91103.pdf
INTRANET SECURITY USING A LAN PACKETSNIFFER TO MONITOR TRAFFIC
Ogbu N. Henry1 and Moses Adah Agana2 , 1Ebonyi State University, Nigeria ,2University of Calabar, Nigeria
This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented usingfive computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). The outcome can aid network administrators to control Intranet access and provide security.
Packet, Sniffer, Protocol, Address, Network, Frame
For More Details :
https://aircconline.com/csit/papers/vol9/csit90806.pdf
ENERGY SPARING OF THE LEACHCOMMUNICATION MECHANISM INHETEROGENEOUS WSN
Zoltán Gál1 and Mohamed Amine Korteby 2 1,2 University of Debrecen, Hungary
In current years, there have been a large progress in Wireless Sensor Networks (WSN) due to their development in term of hardware and cost reduction. Plenty of routing protocols have been proposed and developed depending on the application and network architecture. One of the most efficient energy management of the wireless sensor networknodes is provided by the LEACH (Low Energy Adaptive Clustering Hierarchy) mechanism. This hierarchical protocol uses cluster head function of the nodes to aggregate and forward the messages from the cluster members to the Sink node. Each node decides to become cluster head stochastically in each epoch time intervals. Nodes have enough energy to reach directly through radio channel any ofthe nearest cluster nodes, as well as the sink node. Optimization algorithm is required to provide efficient energy consumption on the WSN clusters level. A node being cluster head in the actual epoch time can repeat this function just with a probability p in time. Classical nodes find the nearest cluster head to minimize the transmission energy consumption and use time division multiple access method (TDMA)to send the radio frames in each epoch time. In this paper we use own developed simulation method and software to analyze the remaining energy process in time of the whole WSN network and the number of forwarded frames in function of the probability p for a set of nodes having heterogeneous levels of the initial energy.
Internet of Things (IoT), Wireless Sensor Network(WSN), Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, radio communication, energy sparing, stochastic process
For More Details :
https://aircconline.com/csit/papers/vol9/csit90406.pdf
IMPLEMENTATION OF MACHINE LEARNINGSPECTRUM SENSING FOR COGNITIVE RADIOAPPLICATIONS
Mohamed El-Tarhuni1, Khaled Assaleh2, and Firas Kiftaro1 1American University of Sharjah, UAE 2Ajman University, UAE
In this paper, a cognitive radio system is implemented using National Instruments (NI) Universal Software Radio Peripheral (USRP) devices. The implemented system provides a working prototype based on real data generated and collected by an experimental laboratory setup to compare the performance of spectrum sensing algorithms based on energy detection and polynomial classifier channel sensing techniques. For a sensing time interval ranging from 0.05 ms to 5ms, the experimental results show that the polynomial classifier has a better performance compared to the conventional energy detector in terms of the misclassification rate, especially at lower SNR values.
Cognitive Radio, Spectrum Dynamic Access, Spectrum Sensing, Polynomial Classifier, EnergyDetection, USRP
For More Details :
https://aircconline.com/csit/papers/vol9/csit90405.pdf
ENERGY SPARING OF THE LEACHCOMMUNICATION MECHANISM INHETEROGENEOUS WSN
Zoltán Gál1 and Mohamed Amine Korteby2 1,2 University of Debrecen, Hungary
In current years, there have been a large progress in Wireless Sensor Networks (WSN) due to their development in term of hardware and cost reduction. Plenty of routing protocols have been proposed and developed depending on the application and network architecture. One of the most efficient energy management of the wireless sensor networknodes is provided by the LEACH (Low Energy Adaptive Clustering Hierarchy) mechanism. This hierarchical protocol uses cluster head function of the nodes to aggregate and forward the messages from the cluster members to the Sink node. Each node decides to become cluster head stochastically in each epoch time intervals. Nodes have enough energy to reach directly through radio channel any ofthe nearest cluster nodes, as well as the sink node. Optimization algorithm is required to provide efficient energy consumption on the WSN clusters level. A node being cluster head in the actual epoch time can repeat this function just with a probability p in time. Classical nodes find the nearest cluster head to minimize the transmission energy consumption and use time division multiple access method (TDMA)to send the radio frames in each epoch time. In this paper we use own developed simulation method and software to analyze the remaining energy process in time of the whole WSN network and the number of forwarded frames in function of the probability p for a set of nodes having heterogeneous levels of the initial energy.
Internet of Things (IoT), Wireless Sensor Network(WSN), Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, radio communication, energy sparing, stochastic process.
For More Details :
https://aircconline.com/csit/papers/vol9/csit90406.pdf
ARRAY FACTOR IN CURVED MICROSTRIPLINEARRAY ANTENNA FOR RADARCOMMUNICATION SYSTEMS
Putu Artawan1,2 Yono Hadi Pramono1, Mashuri1 Josaphat T. SriSumantyo3 , 1Institut Teknologi Sepuluh, Indonesia , 2Faculty of Mathematics and Natural Sciences, Ganesha 3Chiba University, Japan
This paper chiefly deals with techniques of stereo vision, particularly focuses on the procedure of stereo matching. In addition, the proposed approach deals with detection of the regions of occlusion. Prior to carrying out stereo matching, image segmentation is conducted in order to achieve precise matching results. In practice, in stereo vision, matching algorithm sometimes suffers from insufficient accuracy if occlusion is inherent with the scene of interest. Searching the matching regions is conducted based on cross correlation and based on finding a region of the minimum mean square error of the difference between the areas of interest defined in matching window. Middlebury dataset is used for experiments, comparison with the existed results, and the proposed algorithm shows better performance than the existed matching algorithms. To evaluate the proposed algorithm, we compare the result of disparity to the existed ones.
Array, Curved microstripline, Radar communication, C-Band, X-Band
For More Details :
https://airccj.org/CSCP/vol9/csit90314.pdf