首页 > 最新文献

2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)最新文献

英文 中文
Flower shaped antenna for terahertz applications 用于太赫兹应用的花形天线
Vaibhav Kathuria, Ankit Yadav, Aquib Malik, U. Kumar, M. Tripathy
Flower shaped antenna along with a rectangular resonator is reported in this paper for THz applications. The dimension of antenna is 20×30×1.6 mm3. FR4 material is used as substrate. Return loss, radiation pattern and gain of the antenna are presented and analyzed to study the performance of the antenna for THz applications. The frequency band is obtained at 0.92 THz with the impedance bandwidth of 710 GHz. The peak gain of this antenna is obtained as 12.786 dB at 1.01 THz.
本文报道了一种用于太赫兹应用的带矩形谐振腔的花形天线。天线尺寸为20×30×1.6 mm3。采用FR4材料作为衬底。对天线的回波损耗、辐射方向图和增益进行了分析,研究了该天线在太赫兹波段的性能。得到的频段为0.92 THz,阻抗带宽为710 GHz。该天线在1.01 THz下的峰值增益为12.786 dB。
{"title":"Flower shaped antenna for terahertz applications","authors":"Vaibhav Kathuria, Ankit Yadav, Aquib Malik, U. Kumar, M. Tripathy","doi":"10.1109/WOCN.2016.7759886","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759886","url":null,"abstract":"Flower shaped antenna along with a rectangular resonator is reported in this paper for THz applications. The dimension of antenna is 20×30×1.6 mm3. FR4 material is used as substrate. Return loss, radiation pattern and gain of the antenna are presented and analyzed to study the performance of the antenna for THz applications. The frequency band is obtained at 0.92 THz with the impedance bandwidth of 710 GHz. The peak gain of this antenna is obtained as 12.786 dB at 1.01 THz.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A side channel based power analysis technique for hardware trojan detection using statistical learning approach 一种基于侧信道功率分析的基于统计学习方法的硬件木马检测技术
Roshni Shende, D. Ambawade
Hardware Trojan (HT) is an intentional and the undesired modification of the integrated circuit (IC) and major security issue for the semiconductor industry. HT alters the normal working of IC, can leak the secret information or may damage the IC permanently. Due to the small size of the devices on IC, detection of trojan is very difficult by normal testing methods. In this paper, a side channel based trojan detection technique using power analysis is used to detect the trojan infected IC. Here a trust-hub test bench circuit is used to validate trojan detection technique in which the Trojan is inserted on AES-128 bit crypto core. The trojan detection is improved by analyzing the power of IC without trojan (Golden model) and IC with trojan (Trojan model) and by comparing the mean of power traces of both the IC. Statistical data analysis is performed and statistical parameters of power are calculated which are then used as feature vectors. These feature vectors are reduced by using Principal Component Analysis (PCA) algorithm and then classified using Linear Discriminant Analysis (LDA) which discriminates between the Golden and Trojan model and detects the trojan infected IC from the IC under test with 100% accuracy.
硬件木马(HT)是对集成电路(IC)的故意和不希望的修改,是半导体行业的主要安全问题。HT会改变IC的正常工作,泄露机密信息或对IC造成永久性损坏。由于集成电路上的器件体积小,常规的测试方法很难检测出木马。本文提出了一种基于侧信道的基于功率分析的木马检测技术来检测被木马感染的集成电路,并利用信任集线器测试台电路验证了将木马插入AES-128位加密核心上的木马检测技术。通过分析不带特洛伊木马的IC(黄金模型)和带特洛伊木马的IC(特洛伊模型)的功耗,比较两种IC的功率走线平均值,改进了木马检测方法。对数据进行统计分析,计算出功耗的统计参数作为特征向量。这些特征向量通过主成分分析(PCA)算法进行约简,然后使用线性判别分析(LDA)进行分类,LDA可以区分Golden和Trojan模型,并以100%的准确率检测出受木马感染的IC和被测试的IC。
{"title":"A side channel based power analysis technique for hardware trojan detection using statistical learning approach","authors":"Roshni Shende, D. Ambawade","doi":"10.1109/WOCN.2016.7759894","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759894","url":null,"abstract":"Hardware Trojan (HT) is an intentional and the undesired modification of the integrated circuit (IC) and major security issue for the semiconductor industry. HT alters the normal working of IC, can leak the secret information or may damage the IC permanently. Due to the small size of the devices on IC, detection of trojan is very difficult by normal testing methods. In this paper, a side channel based trojan detection technique using power analysis is used to detect the trojan infected IC. Here a trust-hub test bench circuit is used to validate trojan detection technique in which the Trojan is inserted on AES-128 bit crypto core. The trojan detection is improved by analyzing the power of IC without trojan (Golden model) and IC with trojan (Trojan model) and by comparing the mean of power traces of both the IC. Statistical data analysis is performed and statistical parameters of power are calculated which are then used as feature vectors. These feature vectors are reduced by using Principal Component Analysis (PCA) algorithm and then classified using Linear Discriminant Analysis (LDA) which discriminates between the Golden and Trojan model and detects the trojan infected IC from the IC under test with 100% accuracy.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133349242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An integer linear formulation scheme for data collection in wireless sensor network using mobile element (ME) 基于移动单元(ME)的无线传感器网络数据采集的整数线性表述方案
Sujeet Kumar, R. Chaudhary, A. Deepak, D. Dash
Nowadays wireless sensor network (WSN) plays an important role in every field of technology. Data collection is a major issue in WSN because the data has to be collected in a way that maximizes life time of WSN, minimizes the energy consumption and gives shortest path in case of mobile sinks. In this paper we divide the whole network into grids. Certain grids are critical (e.g., during a terror strike) in the sense that (a) it may not be possible for mobile elements to enter those grids, and (b) the sensor nodes in those grids are required to sense data at a higher rate due to the critically in the their surrounding environment. A subset of sensor nodes are designated as cache points such that each sensor node must deliver its sensed data to one of the cache points. Now the mobile movable sink has to make a tour schedule and visit each cache point exactly once such that it is able to collect data from all cache points in due time without causing buffer overflow at any of the cache points. We divide the problem into two parts. In the first part, we find cache points such that no cache point is also a critical sensor node and the energy consumption by critical nodes is minimized. In the second part, we find the shortest path among the caches points from the first step. Both problems are known to be NP-Complete and here we give ILP formulations for them.
目前,无线传感器网络(WSN)在各个技术领域发挥着重要作用。数据收集是无线传感器网络的一个主要问题,因为数据的收集方式必须使无线传感器网络的寿命最大化,能量消耗最小化,并且在移动接收器的情况下给出最短的路径。在本文中,我们将整个网络划分为网格。某些网格是关键的(例如,在恐怖袭击期间),在某种意义上(a)移动元素可能不可能进入这些网格,以及(b)由于周围环境的关键,这些网格中的传感器节点需要以更高的速率感知数据。传感器节点的子集被指定为缓存点,使得每个传感器节点必须将其感测数据传递到缓存点之一。现在,移动可移动接收器必须制定一个行程计划,并访问每个缓存点一次,以便它能够在适当的时间从所有缓存点收集数据,而不会导致任何缓存点的缓冲区溢出。我们把这个问题分成两部分。在第一部分中,我们寻找缓存点,使得没有缓存点也是关键传感器节点,并且关键节点的能量消耗最小。在第二部分中,我们从第一步开始寻找缓存点之间的最短路径。已知这两个问题都是np完全的,这里我们给出它们的ILP公式。
{"title":"An integer linear formulation scheme for data collection in wireless sensor network using mobile element (ME)","authors":"Sujeet Kumar, R. Chaudhary, A. Deepak, D. Dash","doi":"10.1109/WOCN.2016.7759892","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759892","url":null,"abstract":"Nowadays wireless sensor network (WSN) plays an important role in every field of technology. Data collection is a major issue in WSN because the data has to be collected in a way that maximizes life time of WSN, minimizes the energy consumption and gives shortest path in case of mobile sinks. In this paper we divide the whole network into grids. Certain grids are critical (e.g., during a terror strike) in the sense that (a) it may not be possible for mobile elements to enter those grids, and (b) the sensor nodes in those grids are required to sense data at a higher rate due to the critically in the their surrounding environment. A subset of sensor nodes are designated as cache points such that each sensor node must deliver its sensed data to one of the cache points. Now the mobile movable sink has to make a tour schedule and visit each cache point exactly once such that it is able to collect data from all cache points in due time without causing buffer overflow at any of the cache points. We divide the problem into two parts. In the first part, we find cache points such that no cache point is also a critical sensor node and the energy consumption by critical nodes is minimized. In the second part, we find the shortest path among the caches points from the first step. Both problems are known to be NP-Complete and here we give ILP formulations for them.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of cognitive radio Overlay Z-channel with trellis shaping and turbo decoding 基于栅格整形和turbo解码的认知无线电覆盖z信道性能研究
A. M. Ahmed, S. Sardar, Mohammed Zafar Ali Khan
In this paper we implement a turbo based Overlay Cognitive radio Z-channel with Trellis shaping, where the primary and cognitive users transmits and receives concurrently, utilizing the same spectrum. We ensure that bit error rate (BER) performance of the Primary does not degrade even in the presence of cognitive user. We derive bit error rate BER curves for both users, and show significant improvement in the performance of primary even in the presence of cognitive user by implementing turbo decoding instead of Viterbi decoder. Simulation results show that turbo decoder provides a coding gain of 9.6dB for Primary and 8.7dB for cognitive user with out trellis shaping and 11.2dB total gain with Trellis shaping for cognitive user, where as conventional Viterbi decoder provides 1.8dB coding gain only.
在本文中,我们实现了一种基于turbo的基于网格形状的叠加认知无线电z信道,其中主要用户和认知用户使用相同的频谱同时发送和接收。我们保证Primary的误码率(BER)性能即使在认知用户的存在下也不会下降。我们得到了两种用户的误码率误码率曲线,并且通过实现turbo解码而不是Viterbi解码器,即使在认知用户存在的情况下,primary的性能也有显着改善。仿真结果表明,turbo解码器在不进行栅格整形的情况下,对初级用户的编码增益为9.6dB,对认知用户的编码增益为8.7dB,对认知用户的编码增益为11.2dB,而传统的维特比解码器仅提供1.8dB的编码增益。
{"title":"Performance of cognitive radio Overlay Z-channel with trellis shaping and turbo decoding","authors":"A. M. Ahmed, S. Sardar, Mohammed Zafar Ali Khan","doi":"10.1109/WOCN.2016.7759030","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759030","url":null,"abstract":"In this paper we implement a turbo based Overlay Cognitive radio Z-channel with Trellis shaping, where the primary and cognitive users transmits and receives concurrently, utilizing the same spectrum. We ensure that bit error rate (BER) performance of the Primary does not degrade even in the presence of cognitive user. We derive bit error rate BER curves for both users, and show significant improvement in the performance of primary even in the presence of cognitive user by implementing turbo decoding instead of Viterbi decoder. Simulation results show that turbo decoder provides a coding gain of 9.6dB for Primary and 8.7dB for cognitive user with out trellis shaping and 11.2dB total gain with Trellis shaping for cognitive user, where as conventional Viterbi decoder provides 1.8dB coding gain only.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122771770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diverse execution dimensions for information conveyance in distant sensor systems 远距离传感器系统中信息传输的不同执行尺寸
K. Krishna, T. Kumar, Y. Sureshbabu, N. Sainath, R. Madanmohan, J. Jeny
For Remote sensor systems, there is an advancement criteria for the system sway on the lifetime can be maintained with the vitality and it can be non-renewable of sensor hubs. Streamlining should be possible for the present and existing strategies taking into account three instrument and they are versatile radio transmission power, abusing hub repetition and topology control. My work depends on sensor hubs particularly frail and solid hubs which can be execute on leftover vitality and propose a topology called Bunching based topology control convention. This convention augments system lifetime of which the availability might be upgraded. Our proposed convention assesses Java Simulator-different measurements measures the execution criteria particularly normal postponement, system lifetime and vitality usage least.
对于遥感系统来说,传感器集线器的生命周期是否能保持活力和不可更新,存在着系统摇摆的先进性标准。考虑到三种仪器和它们是通用无线电传输功率,滥用集线器重复和拓扑控制,精简现有和现有战略应该是可能的。我的工作依赖于传感器集线器,特别是脆弱而坚固的集线器,它可以在剩余的活力上执行,并提出一种称为基于聚束的拓扑控制约定的拓扑。此约定延长了可用性可以升级的系统生命周期。我们建议的约定评估Java simulator——不同的测量方法测量执行标准,特别是正常延迟、系统生命周期和活力使用最少。
{"title":"Diverse execution dimensions for information conveyance in distant sensor systems","authors":"K. Krishna, T. Kumar, Y. Sureshbabu, N. Sainath, R. Madanmohan, J. Jeny","doi":"10.1109/WOCN.2016.7759897","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759897","url":null,"abstract":"For Remote sensor systems, there is an advancement criteria for the system sway on the lifetime can be maintained with the vitality and it can be non-renewable of sensor hubs. Streamlining should be possible for the present and existing strategies taking into account three instrument and they are versatile radio transmission power, abusing hub repetition and topology control. My work depends on sensor hubs particularly frail and solid hubs which can be execute on leftover vitality and propose a topology called Bunching based topology control convention. This convention augments system lifetime of which the availability might be upgraded. Our proposed convention assesses Java Simulator-different measurements measures the execution criteria particularly normal postponement, system lifetime and vitality usage least.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116076470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A combined technique for attack monitoring and risk assessment in MANET routing MANET路由中攻击监控与风险评估相结合的技术
Jayashree S. Patil, Dr. K. V. N. Sunitha
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses some nodes as monitoring nodes using Gittins index. The monitoring nodes are responsible for observing and discovering risks among nodes. Once risk in a node is detected considering reliability and reputation values, a warning message is forwarded to the node to invoke the risk assessment process. Efficiency of the proposed technique is proved through simulation results. It shows the combined technique increases packet delivery ratio and it achieves the risk assessment process with low computation cost and overhead.
移动自组网(MANET)由于其移动性和动态拓扑变化等特点,极易受到更多的攻击。特别是在无线局域网中,路由过程被更多的攻击者瞄准,各种攻击破坏数据传输。在本文中,我们介绍了一种针对MANET路由的攻击监控和风险评估相结合的技术。该方案利用Gittins指数选择部分节点作为监控节点。监控节点负责观察和发现节点之间的风险。一旦根据可靠性和声誉值检测到节点中的风险,就会将警告消息转发到该节点以调用风险评估流程。仿真结果证明了该方法的有效性。结果表明,该组合技术提高了分组传送率,并以较低的计算成本和开销实现了风险评估过程。
{"title":"A combined technique for attack monitoring and risk assessment in MANET routing","authors":"Jayashree S. Patil, Dr. K. V. N. Sunitha","doi":"10.1109/WOCN.2016.7759890","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759890","url":null,"abstract":"Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses some nodes as monitoring nodes using Gittins index. The monitoring nodes are responsible for observing and discovering risks among nodes. Once risk in a node is detected considering reliability and reputation values, a warning message is forwarded to the node to invoke the risk assessment process. Efficiency of the proposed technique is proved through simulation results. It shows the combined technique increases packet delivery ratio and it achieves the risk assessment process with low computation cost and overhead.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129186764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new variant of Radix-4 FFT Radix-4 FFT的新变种
Mohammed Zafar Ali Khan, Dr Shaik A. Qadeer
Rader abd Brenner's `real-factor' FFT can be applied to Radix-4 FFT to fetch saving in the multiplication counts. However in turn the number of addition count increases which results in increase in total flop count. For this in this paper two levels of saving ideas are proposed. First is a slight modification to Rader and Brenner's `real-factor' FFT for Radix-4, which not only reduces the multiplication but also makes the total flop count equals to standard Radix-4 FFT. Second is to apply the scaling operation to the Twidlle Factors(TF) similar to Tangent FFT like one proposed by Frigo for split radix so that the net computational complexity is of the order of 4Nlog2N computation, where N is the size of FFT. As such the complexity order is same as Standard Split Radix FFT.
Rader和Brenner的“实因子”FFT可以应用于Radix-4 FFT以节省乘法计数。然而,反过来,加法计数的增加导致总翻牌计数的增加。为此,本文提出了两个层次的节约思路。首先是对Rader和Brenner的Radix-4的“实因子”FFT的轻微修改,这不仅减少了乘法,而且使总翻牌计数等于标准Radix-4 FFT。第二种是对twidle Factors(TF)进行缩放操作,类似于Frigo提出的分割基数的Tangent FFT,使净计算复杂度达到4Nlog2N的数量级,其中N为FFT的大小。因此,复杂度顺序与标准分割基数FFT相同。
{"title":"A new variant of Radix-4 FFT","authors":"Mohammed Zafar Ali Khan, Dr Shaik A. Qadeer","doi":"10.1109/WOCN.2016.7759873","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759873","url":null,"abstract":"Rader abd Brenner's `real-factor' FFT can be applied to Radix-4 FFT to fetch saving in the multiplication counts. However in turn the number of addition count increases which results in increase in total flop count. For this in this paper two levels of saving ideas are proposed. First is a slight modification to Rader and Brenner's `real-factor' FFT for Radix-4, which not only reduces the multiplication but also makes the total flop count equals to standard Radix-4 FFT. Second is to apply the scaling operation to the Twidlle Factors(TF) similar to Tangent FFT like one proposed by Frigo for split radix so that the net computational complexity is of the order of 4Nlog2N computation, where N is the size of FFT. As such the complexity order is same as Standard Split Radix FFT.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Position verification technique for secure geographical routing in MANET MANET中安全地理路由的位置验证技术
S. L Aruna Rao, K. V. N. Sunitha
MANET is a dynamic network which is used extensively today due to its diverse applications in several fields like military battlefield, disaster relief operations, etc. Since MANET has a mobile topology, the position of every node keeps changing from time to time. Hence, during data transmission, several nodes enter and leave the network. As a result, MANETs are vulnerable to several attacks in which the attackers get access to the network through malicious nodes entering the network in disguise of valid nodes. So, in MANETs, it is necessary to verify the nodes before using them to forward data packets/messages. In this paper, position verification technique for secure geographical routing has been proposed in MANET. In this technique, we estimate the position of the nodes before using them as forwarding nodes. Once the location is estimated, then it is verified for authenticity and then used for transmitting data packets.
MANET是一种动态网络,在军事战场、救灾行动等多个领域得到了广泛的应用。由于MANET具有移动拓扑结构,因此每个节点的位置都在不断变化。因此,在数据传输过程中,多个节点进入和离开网络。因此,攻击者通过恶意节点伪装成有效节点进入网络,从而获得对网络的访问权限。因此,在manet中,在使用节点转发数据包/消息之前,有必要对节点进行验证。本文提出了一种用于MANET安全地理路由的位置验证技术。在这种技术中,我们在使用节点作为转发节点之前估计节点的位置。一旦位置被估计,然后验证它的真实性,然后用于传输数据包。
{"title":"Position verification technique for secure geographical routing in MANET","authors":"S. L Aruna Rao, K. V. N. Sunitha","doi":"10.1109/WOCN.2016.7759889","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759889","url":null,"abstract":"MANET is a dynamic network which is used extensively today due to its diverse applications in several fields like military battlefield, disaster relief operations, etc. Since MANET has a mobile topology, the position of every node keeps changing from time to time. Hence, during data transmission, several nodes enter and leave the network. As a result, MANETs are vulnerable to several attacks in which the attackers get access to the network through malicious nodes entering the network in disguise of valid nodes. So, in MANETs, it is necessary to verify the nodes before using them to forward data packets/messages. In this paper, position verification technique for secure geographical routing has been proposed in MANET. In this technique, we estimate the position of the nodes before using them as forwarding nodes. Once the location is estimated, then it is verified for authenticity and then used for transmitting data packets.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A mechanism of preventing sybil attack in MANET using bacterial foraging optimization 一种基于细菌觅食优化的MANET防病毒攻击机制
Sonam Mahajan, Nidhi Dahiya, Devesh Kumar
Every author seeks to optimize the QOS in MANET network through routing. Essentially, Qos optimization is used to enhance the life time so that less energy can be consumed, additional packets should be distributed with less Bit Error Ratio and less routing overhead. In this research, the performance analysis of DSR routing protocol is evaluated. Firstly the optimization technique i.e. Bacterial Foraging optimization is applied individually on DSR routing protocol and then compare the performance analysis of DSR routing protocol through BFO approach and without BFO approach that performs better to increase the lifetime of the MANET network so that packets will be transferred in an efficient manner and with less error rate so that the chance of node failure will be less and prolong the lifetime of the network for the realization of routing optimization.
每个作者都在寻求通过路由优化MANET网络的QOS。从本质上讲,Qos优化用于提高生命周期,以便可以消耗更少的能量,应该以更少的误码率和更少的路由开销分发额外的数据包。本文对DSR路由协议进行了性能分析。首先将细菌觅食优化技术单独应用于DSR路由协议,然后对采用BFO方法和不采用BFO方法的DSR路由协议进行性能分析比较,BFO方法的性能更好,可以提高MANET网络的生存期,使数据包以更有效的方式传输,错误率更低,从而减少节点故障的机会,延长网络的生存期路由优化。
{"title":"A mechanism of preventing sybil attack in MANET using bacterial foraging optimization","authors":"Sonam Mahajan, Nidhi Dahiya, Devesh Kumar","doi":"10.1109/WOCN.2016.7759896","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759896","url":null,"abstract":"Every author seeks to optimize the QOS in MANET network through routing. Essentially, Qos optimization is used to enhance the life time so that less energy can be consumed, additional packets should be distributed with less Bit Error Ratio and less routing overhead. In this research, the performance analysis of DSR routing protocol is evaluated. Firstly the optimization technique i.e. Bacterial Foraging optimization is applied individually on DSR routing protocol and then compare the performance analysis of DSR routing protocol through BFO approach and without BFO approach that performs better to increase the lifetime of the MANET network so that packets will be transferred in an efficient manner and with less error rate so that the chance of node failure will be less and prolong the lifetime of the network for the realization of routing optimization.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Near field application: NFC smart notice board 近场应用:NFC智能公告板
G. Rajesh, Praveenraj Pattar, M. N. Divya, Vara Prasad
One of the conventional ways of dispersing information in a university or corporate office is through the Notice Board. Notice boards are an ideal platform that allows one to put up information so that it can be seen by everyone. Whenever there is a new circular to be dispersed among the students or employees, it will be immediately put up on the notice board where everyone has to manually gather at the board and look into the notice. In the busy and fast moving world today, this will lead to wastage of time. Instead, this paper provides a solution to the above problem using NFC application. The idea that has been proposed in this paper is to display the notice board through NFC tags. Each NFC tag is programmed to contain the notice information to display. Whenever it is required for a circular to be displayed just program (Update the Notice) the NFC tag. The students, employees etc., can scan the NFC tag through their NFC enabled smart phones which downloads the notice in the document format online into their handheld devices. This solution is user-friendly as the end-user can read the notices at their own convenient time in turn leads no wastage of time.
在大学或公司办公室发布信息的一种传统方式是通过布告栏。布告栏是一个理想的平台,它允许人们发布信息,以便每个人都能看到。每当有新的通知要分发给学生或员工时,它将立即被张贴在布告栏上,每个人都必须手动聚集在布告栏前并查看通知。在当今这个繁忙和快速发展的世界里,这将导致时间的浪费。本文提出了一种利用NFC应用解决上述问题的方法。本文提出的想法是通过NFC标签来显示公告板。每个NFC标签都被编程为包含要显示的通知信息。每当需要显示通知时,只需编程(更新通知)NFC标签。学生、员工等可以通过支持NFC功能的智能手机扫描NFC标签,将文件格式的通知在线下载到他们的手持设备中。该解决方案是用户友好的,因为最终用户可以在自己方便的时间阅读通知,从而不会浪费时间。
{"title":"Near field application: NFC smart notice board","authors":"G. Rajesh, Praveenraj Pattar, M. N. Divya, Vara Prasad","doi":"10.1109/WOCN.2016.7759887","DOIUrl":"https://doi.org/10.1109/WOCN.2016.7759887","url":null,"abstract":"One of the conventional ways of dispersing information in a university or corporate office is through the Notice Board. Notice boards are an ideal platform that allows one to put up information so that it can be seen by everyone. Whenever there is a new circular to be dispersed among the students or employees, it will be immediately put up on the notice board where everyone has to manually gather at the board and look into the notice. In the busy and fast moving world today, this will lead to wastage of time. Instead, this paper provides a solution to the above problem using NFC application. The idea that has been proposed in this paper is to display the notice board through NFC tags. Each NFC tag is programmed to contain the notice information to display. Whenever it is required for a circular to be displayed just program (Update the Notice) the NFC tag. The students, employees etc., can scan the NFC tag through their NFC enabled smart phones which downloads the notice in the document format online into their handheld devices. This solution is user-friendly as the end-user can read the notices at their own convenient time in turn leads no wastage of time.","PeriodicalId":234041,"journal":{"name":"2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1