Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe
OpenFlow network technologies has attracted attention along with popularization of cloud environment and server virtualization since it enables flexible network configuration. It is expected that existing networks of many organizations will migrate to OpenFlow networks in the future. Since it takes a huge cost to replace all existing network devices to OpenFlow switches, many organizations consider to employ overlay OpenFlow networks where virtual OpenFlow devices are introduced at endpoint servers. In overlay OpenFlow networks, the cost for migration increases according to the number of servers. In this paper, we propose a system for supporting migration to an overlay OpenFlow network. Our proposed system acquires settings of servers in the existing network endpoints and reflects them to the overlay OpenFlow network. Through experimental evaluations, we confirm the behavior of the configuration acquisition function of our proposed system.
{"title":"A System for Supporting Migration to Overlay OpenFlow Network Using OpenStack","authors":"Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe","doi":"10.1109/CISIS.2016.83","DOIUrl":"https://doi.org/10.1109/CISIS.2016.83","url":null,"abstract":"OpenFlow network technologies has attracted attention along with popularization of cloud environment and server virtualization since it enables flexible network configuration. It is expected that existing networks of many organizations will migrate to OpenFlow networks in the future. Since it takes a huge cost to replace all existing network devices to OpenFlow switches, many organizations consider to employ overlay OpenFlow networks where virtual OpenFlow devices are introduced at endpoint servers. In overlay OpenFlow networks, the cost for migration increases according to the number of servers. In this paper, we propose a system for supporting migration to an overlay OpenFlow network. Our proposed system acquires settings of servers in the existing network endpoints and reflects them to the overlay OpenFlow network. Through experimental evaluations, we confirm the behavior of the configuration acquisition function of our proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the adoption of cloud services in contexts where security is mandatory. Nevertheless, despite the number of existing initiatives aimed at formalizing Security SLAs and at representing security guarantees by taking into account both customers' and providers' perspectives, they are far from being commonly adopted in practice by CSPs, due to the difficulty in automatically enforcing and monitoring the security capabilities agreed with customers. In this paper we illustrate, through a case study, a methodology to set-up a catalogue of security capabilities that can be offered as-a-service, on top of which specific guarantees can be specified through a Security SLA. Such a methodology, which explicitly takes into account the constraints behind the definition of formal guarantees related to security, is meant to serve as a guideline for providers willing to offer for their services specific security features that can be monitored and assessed by customers during operation.
{"title":"A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services","authors":"V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano","doi":"10.1109/CISIS.2016.116","DOIUrl":"https://doi.org/10.1109/CISIS.2016.116","url":null,"abstract":"The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the adoption of cloud services in contexts where security is mandatory. Nevertheless, despite the number of existing initiatives aimed at formalizing Security SLAs and at representing security guarantees by taking into account both customers' and providers' perspectives, they are far from being commonly adopted in practice by CSPs, due to the difficulty in automatically enforcing and monitoring the security capabilities agreed with customers. In this paper we illustrate, through a case study, a methodology to set-up a catalogue of security capabilities that can be offered as-a-service, on top of which specific guarantees can be specified through a Security SLA. Such a methodology, which explicitly takes into account the constraints behind the definition of formal guarantees related to security, is meant to serve as a guideline for providers willing to offer for their services specific security features that can be monitored and assessed by customers during operation.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present a Fuzzy based approach for improving the security of cluster nodes in MANETs. From the simulation results, we found that by selecting nodes with high SC rate, the nodes are more secure and the system performance is improved.
{"title":"A Fuzzy-Based System for Improving Node Security in MANET Clusters","authors":"Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli","doi":"10.1109/CISIS.2016.54","DOIUrl":"https://doi.org/10.1109/CISIS.2016.54","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present a Fuzzy based approach for improving the security of cluster nodes in MANETs. From the simulation results, we found that by selecting nodes with high SC rate, the nodes are more secure and the system performance is improved.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid
This paper conducts a comprehensive survey on fuzzy logic applications in wireless and mobile communication area in general and of growing LTE communication networks in particular. The survey aims to highlight the principles of fuzzy logic applications in the area of channel estimation, channel equalization, handover management, QoS management. Furthermore, in LTE advanced heterogeneous networks fuzzy logic applications in the area of interference management are also spotlighted.
{"title":"A Survey on Fuzzy Logic Applications in Wireless and Mobile Communication for LTE Networks","authors":"Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid","doi":"10.1109/CISIS.2016.106","DOIUrl":"https://doi.org/10.1109/CISIS.2016.106","url":null,"abstract":"This paper conducts a comprehensive survey on fuzzy logic applications in wireless and mobile communication area in general and of growing LTE communication networks in particular. The survey aims to highlight the principles of fuzzy logic applications in the area of channel estimation, channel equalization, handover management, QoS management. Furthermore, in LTE advanced heterogeneous networks fuzzy logic applications in the area of interference management are also spotlighted.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He
C is a basic computer language widely used in both industry and education. Many computer programming beginners choose C as the first computer language to learn. But it is difficult for the beginners, especially for high-school students, to learn C programming because the learning supporting environment is not enough. This research proposes PROVIT(PROgramming VIsualization Tool) for Web, an e-Learning supporting environment for C programming education. PROVIT for Web has many features:(1) It can be used to write, run and check C programs without installing any IDE, (2) It especially can be used at lecture to show the execution of C program step by step, and (3) It can detect more run time error often seen in beginner's program. Web PROVIT has been used in a C programming course in author's university. This paper reports the design, implementation and the result of experimental use of PROVIT for Web.
C是一种基本的计算机语言,广泛应用于工业和教育领域。许多计算机编程初学者选择C作为学习的第一门计算机语言。但是对于初学者,特别是高中生来说,学习C语言编程是比较困难的,因为学习支持环境不够。本研究提出一种用于C程式设计教育的网路学习支援环境PROVIT(PROgramming VIsualization Tool for Web)。PROVIT for Web有许多特点:(1)它可以用来编写、运行和检查C程序,而不需要安装任何IDE;(2)它特别适合在课堂上展示C程序的逐步执行;(3)它可以检测出更多初学者程序中经常出现的运行时错误。Web PROVIT已应用于笔者所在大学的C语言编程课程中。本文报道了基于Web的PROVIT的设计、实现和实验结果。
{"title":"A Web Service for C Programming Learning and Teaching","authors":"Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He","doi":"10.1109/CISIS.2016.70","DOIUrl":"https://doi.org/10.1109/CISIS.2016.70","url":null,"abstract":"C is a basic computer language widely used in both industry and education. Many computer programming beginners choose C as the first computer language to learn. But it is difficult for the beginners, especially for high-school students, to learn C programming because the learning supporting environment is not enough. This research proposes PROVIT(PROgramming VIsualization Tool) for Web, an e-Learning supporting environment for C programming education. PROVIT for Web has many features:(1) It can be used to write, run and check C programs without installing any IDE, (2) It especially can be used at lecture to show the execution of C program step by step, and (3) It can detect more run time error often seen in beginner's program. Web PROVIT has been used in a C programming course in author's university. This paper reports the design, implementation and the result of experimental use of PROVIT for Web.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé
Emotion awareness is becoming a key aspect in collaborative work at academia, enterprises and organizations that use collaborative group work in their activity. Due to pervasiveness of ICT's, most of collaboration can be performed through communication media channels such as discussion forums, social networks, etc. The emotive state of the users while they carry out their activity such as collaborative learning at Universities or project work at enterprises and organizations influences very much their performance and can actually determine the final learning or project outcome. Therefore, monitoring the users' emotive states and using that information for providing feedback and scaffolding is crucial. To this end, automated analysis over data collected from communication channels is a useful source. In this paper, we propose an approach to process such collected data in order to classify and assess emotional states of involved users and provide them feedback accordingly to their emotive states. In order to achieve this, a fuzzy approach is used to build the emotive classification system, which is fed with data from ANEW dictionary, whose words are bound to emotional weights and these, in turn, are used to map Fuzzy sets in our proposal. The proposed fuzzy-based system has been evaluated using real data from collaborative learning courses in an academic context.
{"title":"A Fuzzy-Based Approach for Classifying Students' Emotional States in Online Collaborative Work","authors":"Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé","doi":"10.1109/CISIS.2016.141","DOIUrl":"https://doi.org/10.1109/CISIS.2016.141","url":null,"abstract":"Emotion awareness is becoming a key aspect in collaborative work at academia, enterprises and organizations that use collaborative group work in their activity. Due to pervasiveness of ICT's, most of collaboration can be performed through communication media channels such as discussion forums, social networks, etc. The emotive state of the users while they carry out their activity such as collaborative learning at Universities or project work at enterprises and organizations influences very much their performance and can actually determine the final learning or project outcome. Therefore, monitoring the users' emotive states and using that information for providing feedback and scaffolding is crucial. To this end, automated analysis over data collected from communication channels is a useful source. In this paper, we propose an approach to process such collected data in order to classify and assess emotional states of involved users and provide them feedback accordingly to their emotive states. In order to achieve this, a fuzzy approach is used to build the emotive classification system, which is fed with data from ANEW dictionary, whose words are bound to emotional weights and these, in turn, are used to map Fuzzy sets in our proposal. The proposed fuzzy-based system has been evaluated using real data from collaborative learning courses in an academic context.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim
Today, energy is the most valuable resource, new methods and techniques are being discovered to fulfill the demand of energy. However, energy demand growth causes a serious energy crisis, especially when demand is comparatively high and creates the peak load. This problem can be handled by integrating Demand Side Management (DSM) with traditional Smart Grid (SG) through two way communication between utility and customers. The main objective of DSM is peak load reduction where SG targets cost minimization and user comfort maximization. In this study, our emphasis is on cost minimization and load management by shifting the load from peak hours toward the off peak hours. In this underlying study, we adapt hybridization of two optimization approaches, Bacterial Foraging (BFA) and Genetic Algorithm (GA). Simulation results verify that the adapted approach reduces the total cost and peak average ratio by shifting the load on off peak hours with very little difference between minimum and maximum 95% confidence interval.
{"title":"Demand Side Management Using Hybrid Bacterial Foraging and Genetic Algorithm Optimization Techniques","authors":"Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.128","DOIUrl":"https://doi.org/10.1109/CISIS.2016.128","url":null,"abstract":"Today, energy is the most valuable resource, new methods and techniques are being discovered to fulfill the demand of energy. However, energy demand growth causes a serious energy crisis, especially when demand is comparatively high and creates the peak load. This problem can be handled by integrating Demand Side Management (DSM) with traditional Smart Grid (SG) through two way communication between utility and customers. The main objective of DSM is peak load reduction where SG targets cost minimization and user comfort maximization. In this study, our emphasis is on cost minimization and load management by shifting the load from peak hours toward the off peak hours. In this underlying study, we adapt hybridization of two optimization approaches, Bacterial Foraging (BFA) and Genetic Algorithm (GA). Simulation results verify that the adapted approach reduces the total cost and peak average ratio by shifting the load on off peak hours with very little difference between minimum and maximum 95% confidence interval.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid
In this paper, we overcome the problem of energy holes in UWSNs while considering the unique characteristics of underwater communication. In proposed scheme we consider UWSNs where nodes are manually deployed according to the defined deployment pattern to satisfy our application requirements in terms of energy saving. We used mixed routing technique i.e. direct transmission and hop-by-hop transmission for energy balancing in continuous monitoring applications for UWSNs. Sensor nodes forward the total data traffic (generated plus received) periodically to the sink with calculated load weights using variable communication ranges. The transmission ranges for 1-hop, 2-hop and direct transmission to the sink are used for data transmission to achieve load balancing for balanced energy consumption of all sensor nodes in the network. We prove that our scheme outperforms the existing selected schemes in terms of network lifetime and energy conservation. We select an optimal result from the simulation results for different possible combinations of transmissions.
{"title":"Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution","authors":"Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/CISIS.2016.109","DOIUrl":"https://doi.org/10.1109/CISIS.2016.109","url":null,"abstract":"In this paper, we overcome the problem of energy holes in UWSNs while considering the unique characteristics of underwater communication. In proposed scheme we consider UWSNs where nodes are manually deployed according to the defined deployment pattern to satisfy our application requirements in terms of energy saving. We used mixed routing technique i.e. direct transmission and hop-by-hop transmission for energy balancing in continuous monitoring applications for UWSNs. Sensor nodes forward the total data traffic (generated plus received) periodically to the sink with calculated load weights using variable communication ranges. The transmission ranges for 1-hop, 2-hop and direct transmission to the sink are used for data transmission to achieve load balancing for balanced energy consumption of all sensor nodes in the network. We prove that our scheme outperforms the existing selected schemes in terms of network lifetime and energy conservation. We select an optimal result from the simulation results for different possible combinations of transmissions.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyze the performance of k-means clustering algorithm. For evaluation we considered respiratory rate and heart rate metrics. The simulation results show that the k-means clustering algorithm has a good performance.
{"title":"Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach","authors":"Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang","doi":"10.1109/CISIS.2016.59","DOIUrl":"https://doi.org/10.1109/CISIS.2016.59","url":null,"abstract":"Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyze the performance of k-means clustering algorithm. For evaluation we considered respiratory rate and heart rate metrics. The simulation results show that the k-means clustering algorithm has a good performance.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim
In this paper, an energy efficient, interference and route aware (EEIRA) protocol is proposed for underwater wireless sensor networks (UWSNs). The protocol combines the direct and relay forwarding mechanisms in transmitting the packets from source to destination. The relaying process involves selection of the best relay from a set of relay nodes. A relay node having the least distance from source to destination and the minimum number of neighbor nodes qualifies the criterion of the best relay. The direct transmission is used when the best relay is not within the transmission range of the source node. From top to bottom, the network is divided into three different zones, destination, relay and source zone, respectively. The relay zone has the greatest area to have maximum choices of selecting the best relay from the relay nodes residing in it. Nodes in all the three regions can sense the attribute and send the data to the sink. The destination nodes send data directly to sink. The relay nodes send the packets to the sink either directly or through the relaying process. The source nodes in the bottom send the data to sink via the best relay node or directly. Based on simulation results, the proposed protocol outperforms the depth based routing (DBR) scheme in terms of energy efficiency by selecting the best relay, reducing number of hops and following the shortest path to reduce channel losses.
{"title":"EEIRA: An Energy Efficient Interference and Route Aware Protocol for Underwater WSNs","authors":"A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.129","DOIUrl":"https://doi.org/10.1109/CISIS.2016.129","url":null,"abstract":"In this paper, an energy efficient, interference and route aware (EEIRA) protocol is proposed for underwater wireless sensor networks (UWSNs). The protocol combines the direct and relay forwarding mechanisms in transmitting the packets from source to destination. The relaying process involves selection of the best relay from a set of relay nodes. A relay node having the least distance from source to destination and the minimum number of neighbor nodes qualifies the criterion of the best relay. The direct transmission is used when the best relay is not within the transmission range of the source node. From top to bottom, the network is divided into three different zones, destination, relay and source zone, respectively. The relay zone has the greatest area to have maximum choices of selecting the best relay from the relay nodes residing in it. Nodes in all the three regions can sense the attribute and send the data to the sink. The destination nodes send data directly to sink. The relay nodes send the packets to the sink either directly or through the relaying process. The source nodes in the bottom send the data to sink via the best relay node or directly. Based on simulation results, the proposed protocol outperforms the depth based routing (DBR) scheme in terms of energy efficiency by selecting the best relay, reducing number of hops and following the shortest path to reduce channel losses.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}