首页 > 最新文献

International Journal of Mobile Network Design and Innovation最新文献

英文 中文
Mobile data gathering using PSO and minimum covering spanning tree clustered WSN 基于PSO和最小覆盖生成树聚类WSN的移动数据采集
Q4 Business, Management and Accounting Pub Date : 2018-06-18 DOI: 10.1504/IJMNDI.2018.10013510
K. Vijayalakshmi, J. Manickam
In wireless sensor networks (WSN), generally sensors closest to the sink or base station tend to deplete their battery energy faster than other sensors and create an energy hole around the sink. In order to overcome this problem, a mobile data gathering using PSO and minimum covering spanning tree (MDG-PSO-MCST) is proposed. In this technique, multiple sensors are arranged to form clusters. Two SenCars with multiple antennas are deployed in the cluster location and space division multiple access (SDMA) technique is applied for data gathering with energy efficiency. The anchor points are selected for intermediate data collection based on the connectivity and node degree, node compatibility and the distance between the sensors of two adjacent clusters parameters using particle swarm optimisation (PSO) technique. The visiting tour of each Sencars among the selected anchors is performed using the MCST algorithm. By simulation results, we show that the proposed technique minimises the energy consumption and delay, and enhances the network efficiency.
在无线传感器网络(WSN)中,通常离接收器或基站最近的传感器往往比其他传感器更快地耗尽电池能量,并在接收器周围产生能量洞。为了克服这一问题,提出了一种基于粒子群算法和最小覆盖生成树(MDG-PSO-MCST)的移动数据采集方法。在这种技术中,多个传感器被排列成簇。在集群位置部署2台多天线sencar,采用空分多址(SDMA)技术高效采集数据。采用粒子群优化(PSO)技术,根据节点的连通性和节点度、节点的兼容性以及相邻两簇传感器之间的距离参数选择中间数据采集的锚点。使用MCST算法对每个senars在选定锚点之间进行访问。仿真结果表明,该方法使网络的能量消耗和时延降到最低,提高了网络效率。
{"title":"Mobile data gathering using PSO and minimum covering spanning tree clustered WSN","authors":"K. Vijayalakshmi, J. Manickam","doi":"10.1504/IJMNDI.2018.10013510","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013510","url":null,"abstract":"In wireless sensor networks (WSN), generally sensors closest to the sink or base station tend to deplete their battery energy faster than other sensors and create an energy hole around the sink. In order to overcome this problem, a mobile data gathering using PSO and minimum covering spanning tree (MDG-PSO-MCST) is proposed. In this technique, multiple sensors are arranged to form clusters. Two SenCars with multiple antennas are deployed in the cluster location and space division multiple access (SDMA) technique is applied for data gathering with energy efficiency. The anchor points are selected for intermediate data collection based on the connectivity and node degree, node compatibility and the distance between the sensors of two adjacent clusters parameters using particle swarm optimisation (PSO) technique. The visiting tour of each Sencars among the selected anchors is performed using the MCST algorithm. By simulation results, we show that the proposed technique minimises the energy consumption and delay, and enhances the network efficiency.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"41 1","pages":"101"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80062249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative trust-based security and power control techniques for VANET 基于协作信任的VANET安全和功率控制技术
Q4 Business, Management and Accounting Pub Date : 2018-06-18 DOI: 10.1504/IJMNDI.2018.10013504
P. Abi, M. Devi, V. R. Uthariaraj
In VANET, security and power control are the two main challenging issues. In existing works on security, yield additional delay and overhead due to complex cryptographic operations. Hence, the objective is to develop a technique which provides higher security and power control in VANET with less complexity, reduced message dropping, delay, and overhead. Hence, in this work, a trust-based security and power control technique for VANET is proposed. In trust-based security, trust degree of each node is estimated in terms of collaboration trust, behavioural trust and reference trust values. Malicious vehicles are monitored by a set of verifiers. For reducing the power consumption, the channel is cooperatively reserved considering the time as well as channel reservation information. Simulation results show that the proposed technique reduces the delay, power consumption and overhead while improving the packet delivery ratio.
在VANET中,安全和电源控制是两个主要的挑战性问题。在现有的安全工作中,由于复杂的加密操作,会产生额外的延迟和开销。因此,目标是开发一种技术,在VANET中提供更高的安全性和功率控制,同时降低复杂性,减少消息丢失、延迟和开销。因此,本文提出了一种基于信任的VANET安全和功率控制技术。在基于信任的安全中,通过协作信任、行为信任和参考信任值来估计每个节点的信任程度。恶意车辆由一组验证器监视。为了降低功耗,在考虑信道预留信息的同时,还考虑了信道预留的时间。仿真结果表明,该技术在提高分组发送率的同时,降低了时延、功耗和开销。
{"title":"Collaborative trust-based security and power control techniques for VANET","authors":"P. Abi, M. Devi, V. R. Uthariaraj","doi":"10.1504/IJMNDI.2018.10013504","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013504","url":null,"abstract":"In VANET, security and power control are the two main challenging issues. In existing works on security, yield additional delay and overhead due to complex cryptographic operations. Hence, the objective is to develop a technique which provides higher security and power control in VANET with less complexity, reduced message dropping, delay, and overhead. Hence, in this work, a trust-based security and power control technique for VANET is proposed. In trust-based security, trust degree of each node is estimated in terms of collaboration trust, behavioural trust and reference trust values. Malicious vehicles are monitored by a set of verifiers. For reducing the power consumption, the channel is cooperatively reserved considering the time as well as channel reservation information. Simulation results show that the proposed technique reduces the delay, power consumption and overhead while improving the packet delivery ratio.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"1 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77566197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic key management system using channel hopping in IEEE 802.15.4 wireless sensor networks 在IEEE 802.15.4无线传感器网络中使用信道跳频的动态密钥管理系统
Q4 Business, Management and Accounting Pub Date : 2018-06-18 DOI: 10.1504/IJMNDI.2018.10013505
G. Manikandan, U. Sakthi
In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.
在无线传感器网络中,传感器节点之间以无线方式相互连接,节点可以在没有任何事先通知的情况下随机进出网络。这使得恶意节点很容易进入网络,从而使网络容易受到各种攻击。其中一种攻击是干扰传输线路,从而破坏正在传输的数据。在本文中,我们提出了一个动态密钥管理系统,基于该系统,数据消息在数据传输过程中从一个通道跳到另一个通道。由于数据传输只在一个通道中持续一小段时间,因此通道不断变化。这将最小化攻击者确定活动通道并攻击它的概率;为了破坏数据。
{"title":"Dynamic key management system using channel hopping in IEEE 802.15.4 wireless sensor networks","authors":"G. Manikandan, U. Sakthi","doi":"10.1504/IJMNDI.2018.10013505","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013505","url":null,"abstract":"In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"35 1","pages":"73"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78724234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy aware hybrid multicast routing in mobile ad hoc networks: zone-based approach 移动自组织网络中能量感知混合组播路由:基于区域的方法
Q4 Business, Management and Accounting Pub Date : 2018-06-18 DOI: 10.1504/IJMNDI.2018.10007281
Gyanappa A. Walikar, R. Biradar
Mobile ad hoc networks (MANETs) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless radio links. Hybrid routing strategy is widely used in hierarchical routing protocols to reduce the control overheads and packet delivery delay in MANETs. In this paper, we propose zone-based energy aware hybrid multicast routing scheme (ZEHMRP) for MANET. Our scheme operates in the following phases: 1) computation of node remaining energy (RE) by designing energy model; 2) prune the nodes having remaining energy less than predefined threshold value; 3) discovery of multiple routes using request and reply packets; 4) selection of stable route among multiple routes by considering node remaining energy and density; 5) route maintenance for route breaks and node failures; 6) simulation evaluation for various parameters. It is observed that ZEHMRP outperforms the zone routing protocol (ZRP) for various parameters like packet delivery ratio, end-to-end delay, jitter, and control overheads.
移动自组织网络(manet)是由通过无线无线电链路连接的移动节点自治系统动态形成的。混合路由策略被广泛应用于分层路由协议中,以减少manet的控制开销和分组传输延迟。本文提出了一种基于区域的能量感知混合组播路由方案(ZEHMRP)。该方案分为以下几个阶段:1)通过设计能量模型计算节点剩余能量(RE);2)对剩余能量小于预定义阈值的节点进行剪枝;3)利用请求和应答报文发现多条路由;4)考虑节点剩余能量和密度,在多条路径中选择稳定路径;5)路由中断、节点故障时的路由维护;6)对各参数进行仿真评估。可以观察到,ZEHMRP在各种参数上都优于区域路由协议ZRP (zone routing protocol),如包投递率、端到端延迟、抖动和控制开销。
{"title":"Energy aware hybrid multicast routing in mobile ad hoc networks: zone-based approach","authors":"Gyanappa A. Walikar, R. Biradar","doi":"10.1504/IJMNDI.2018.10007281","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10007281","url":null,"abstract":"Mobile ad hoc networks (MANETs) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless radio links. Hybrid routing strategy is widely used in hierarchical routing protocols to reduce the control overheads and packet delivery delay in MANETs. In this paper, we propose zone-based energy aware hybrid multicast routing scheme (ZEHMRP) for MANET. Our scheme operates in the following phases: 1) computation of node remaining energy (RE) by designing energy model; 2) prune the nodes having remaining energy less than predefined threshold value; 3) discovery of multiple routes using request and reply packets; 4) selection of stable route among multiple routes by considering node remaining energy and density; 5) route maintenance for route breaks and node failures; 6) simulation evaluation for various parameters. It is observed that ZEHMRP outperforms the zone routing protocol (ZRP) for various parameters like packet delivery ratio, end-to-end delay, jitter, and control overheads.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"42 1","pages":"80"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85280152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A generalised modelling discussion for portable wireless base stations during emergencies 紧急情况下便携式无线基站的广义建模讨论
Q4 Business, Management and Accounting Pub Date : 2018-06-18 DOI: 10.1504/IJMNDI.2018.10013508
L. LeBlanc
The occurrence of natural disasters and emergencies creates the need for communication between and among emergency responders, the region's population, and other governmental and non-governmental agencies and organisations. Key information that is to be disseminated among these groups must rely on communication networks that may have been rendered partially or fully inoperable. In these scenarios, temporary wireless telecommunications infrastructure can be utilised to provide the links necessary for critical communications. While the deployment of temporary mobile networks and other wireless equipment during the aftermath of disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimisation effort involved with respect to maximising key performance measures of the deployment or minimising overall cost to deploy. This work does not focus on the question of what entity will operate the portable base stations or wireless equipment utilised during a disaster, only the question of optimising placement for planning and real time management. I examine the modelling and optimisation of the deployment of a wireless infrastructure prior to, during, and after an emergency or crisis.
自然灾害和紧急情况的发生需要应急人员、该地区的人口以及其他政府和非政府机构和组织之间的沟通。要在这些群体中传播的关键信息必须依靠可能部分或全部无法使用的通讯网络。在这些情况下,可以利用临时无线电信基础设施来提供关键通信所需的链路。虽然政府机构和网络提供商在灾害后成功地完成了临时移动网络和其他无线设备的部署,但在最大限度地提高部署的关键绩效指标或最大限度地降低部署的总体成本方面,似乎很少进行优化工作。这项工作的重点不在于由哪个实体来操作灾害期间使用的便携式基站或无线设备,而只在于为规划和实时管理优化安置的问题。我研究了在紧急情况或危机发生之前、期间和之后无线基础设施部署的建模和优化。
{"title":"A generalised modelling discussion for portable wireless base stations during emergencies","authors":"L. LeBlanc","doi":"10.1504/IJMNDI.2018.10013508","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013508","url":null,"abstract":"The occurrence of natural disasters and emergencies creates the need for communication between and among emergency responders, the region's population, and other governmental and non-governmental agencies and organisations. Key information that is to be disseminated among these groups must rely on communication networks that may have been rendered partially or fully inoperable. In these scenarios, temporary wireless telecommunications infrastructure can be utilised to provide the links necessary for critical communications. While the deployment of temporary mobile networks and other wireless equipment during the aftermath of disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimisation effort involved with respect to maximising key performance measures of the deployment or minimising overall cost to deploy. This work does not focus on the question of what entity will operate the portable base stations or wireless equipment utilised during a disaster, only the question of optimising placement for planning and real time management. I examine the modelling and optimisation of the deployment of a wireless infrastructure prior to, during, and after an emergency or crisis.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"11 16 1","pages":"61"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78404724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimising network cost by employing sliding window method at mobile switching centres in GSM network 在GSM网络中移动交换中心采用滑动窗口方法使网络成本最小化
Q4 Business, Management and Accounting Pub Date : 2018-03-05 DOI: 10.1504/IJMNDI.2018.10011193
M. Nuka, M. Naidu
The cost effort of a global system for mobile communications (GSM) network is to be minimised for meeting effectively and efficiently the service requirements of ever increasing mobile subscriber's base. The period of temporary storage of subscribers' profiles in visitor location register (VLR) at a mobile switching centre (MSC) affects the cost of GSM network. This research study proposes a sliding window method for determining the storage period of profiles in VLR that minimises the network cost of GSM network. Further, this study examined and evaluated the computational efforts on proposed method. The proposed method proves to be better than the reported set intersection method.
全球移动通信系统(GSM)网络的成本努力必须最小化,以有效和高效地满足不断增加的移动用户群的服务需求。移动交换中心(MSC)在访客位置寄存器(VLR)中临时存储用户资料的时间长短影响着GSM网络的成本。本研究提出了一种滑动窗口法来确定VLR中配置文件的存储周期,使GSM网络的网络成本最小化。此外,本研究对所提出的方法的计算量进行了检验和评估。结果表明,该方法优于已有的集相交法。
{"title":"Minimising network cost by employing sliding window method at mobile switching centres in GSM network","authors":"M. Nuka, M. Naidu","doi":"10.1504/IJMNDI.2018.10011193","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011193","url":null,"abstract":"The cost effort of a global system for mobile communications (GSM) network is to be minimised for meeting effectively and efficiently the service requirements of ever increasing mobile subscriber's base. The period of temporary storage of subscribers' profiles in visitor location register (VLR) at a mobile switching centre (MSC) affects the cost of GSM network. This research study proposes a sliding window method for determining the storage period of profiles in VLR that minimises the network cost of GSM network. Further, this study examined and evaluated the computational efforts on proposed method. The proposed method proves to be better than the reported set intersection method.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"104 1","pages":"45"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79168115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor networks 优化了基于ieee802.15.4无线传感器网络中DDOS和虫洞攻击检测的看门狗系统
Q4 Business, Management and Accounting Pub Date : 2018-03-05 DOI: 10.1504/IJMNDI.2018.10011192
J. Govindasamy, Samundiswary Punniakodi
Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.
由于无线通信的无线广播特性,无线传感器网络容易受到拒绝服务攻击和漏洞攻击。保护无线传感器网络的安全性和保密性至关重要,因此需要设计一种节能的入侵者检测系统(IDS)来检测和减轻攻击。针对基于IEEE 802.15.4的无线传感器网络,提出了一种基于能量预测的节能入侵者检测系统(EE-IDSEP),用于检测和缓解分布式拒绝服务(DDoS)攻击(即资源耗尽攻击、电量耗尽攻击和洪水)和虫洞攻击。EE-IDSEP的设计由优化的看门狗系统和隐马尔可夫模型(HMM)组成。虫洞攻击检测使用优化的看门狗系统。优化后的监督机制是一种基于信任的方法,用于评估网络中所有节点的有效性。利用隐马尔可夫模型基于能量消耗检测DDoS攻击。利用NS2仿真器对EE-IDS模型进行仿真,并在PDR、丢包率和能耗方面与现有节能信任系统EE-TS进行比较。
{"title":"Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor networks","authors":"J. Govindasamy, Samundiswary Punniakodi","doi":"10.1504/IJMNDI.2018.10011192","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011192","url":null,"abstract":"Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"56 1","pages":"36"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89212401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Resource allocation and rate adaptation for multicast of real-time traffic in MANET MANET中实时业务组播的资源分配与速率自适应
Q4 Business, Management and Accounting Pub Date : 2018-03-05 DOI: 10.1504/IJMNDI.2018.10011190
K. Subramaniam, L. Tamilselvan
Multicasting is influenced with increasing importance of real-time and multimedia with different quality of service (QoS) requirement. But mobile ad hoc network (MANET) has limited bandwidth and also the physical channel results in unpredictable resource fluctuation and interference. In order to overcome these issues, resource allocation and rate adaption technique for multicast of real-time traffic in MANET is proposed. In this technique, reservation protocol is used while transmitting real-time data packets in order to reserve future slots and hence, it can be deployed in particular time slot. A three hop slot assignment mechanism is adopted to provide an interference free model. Also, normalised transmission rate is used to characterise transmission rate adoption. The benefit of using this technique is that even if a single copy of data is transmitted by sender, multicast receiver can hear the transmitted signal for each multimedia layer.
随着实时性和多媒体的重要性日益提高,对服务质量(QoS)的要求也越来越高,对组播的影响也越来越大。但移动自组网带宽有限,且物理信道存在不可预测的资源波动和干扰。为了克服这些问题,提出了面向MANET实时业务组播的资源分配和速率自适应技术。在该技术中,在传输实时数据包时使用保留协议,以保留未来的时隙,从而可以在特定的时隙中部署。采用三跳隙分配机制提供无干扰模型。此外,标准化传输速率用于表征传输速率的采用。使用这种技术的好处是,即使发送方只传输一个数据副本,多播接收方也可以听到每个多媒体层的传输信号。
{"title":"Resource allocation and rate adaptation for multicast of real-time traffic in MANET","authors":"K. Subramaniam, L. Tamilselvan","doi":"10.1504/IJMNDI.2018.10011190","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011190","url":null,"abstract":"Multicasting is influenced with increasing importance of real-time and multimedia with different quality of service (QoS) requirement. But mobile ad hoc network (MANET) has limited bandwidth and also the physical channel results in unpredictable resource fluctuation and interference. In order to overcome these issues, resource allocation and rate adaption technique for multicast of real-time traffic in MANET is proposed. In this technique, reservation protocol is used while transmitting real-time data packets in order to reserve future slots and hence, it can be deployed in particular time slot. A three hop slot assignment mechanism is adopted to provide an interference free model. Also, normalised transmission rate is used to characterise transmission rate adoption. The benefit of using this technique is that even if a single copy of data is transmitted by sender, multicast receiver can hear the transmitted signal for each multimedia layer.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"201 1","pages":"17"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88118929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preserving protocol for secure routing in wireless mesh networks 无线网状网络中安全路由的隐私保护协议
Q4 Business, Management and Accounting Pub Date : 2018-03-05 DOI: 10.1504/IJMNDI.2018.10011194
G. Akilarasu, S. Shalinie
In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and privacy attacks. In order to overcome these issues, in this paper, we propose a privacy preserving protocol for secure routing in WMN. In this technique, when a source node wants to transmit privacy information, it performs a secure routing based on the security level of the nodes. Also, it takes direct and delegation tickets into consideration for secure data transmission. Then, in order to authenticate the access of the mobile users, a tri-lateral pseudonym generation method is used. The mesh client registers its real identity to the operating managers and selects a secret key to generate the pseudonym. By simulation results, we show that the proposed technique enhances the network security.
在无线网状网络(WMN)中,存在有损链路、安全攻击和隐私攻击的可能性。为了克服这些问题,本文提出了一种用于WMN安全路由的隐私保护协议。在这种技术中,当源节点希望传输隐私信息时,它会根据节点的安全级别执行安全路由。此外,它还考虑了直接票和委托票,以确保数据传输的安全性。然后,为了验证移动用户的访问,采用了三侧生成假名的方法。网状客户端向运营经理注册真实身份,并选择密钥生成假名。仿真结果表明,该方法提高了网络的安全性。
{"title":"Privacy preserving protocol for secure routing in wireless mesh networks","authors":"G. Akilarasu, S. Shalinie","doi":"10.1504/IJMNDI.2018.10011194","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011194","url":null,"abstract":"In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and privacy attacks. In order to overcome these issues, in this paper, we propose a privacy preserving protocol for secure routing in WMN. In this technique, when a source node wants to transmit privacy information, it performs a secure routing based on the security level of the nodes. Also, it takes direct and delegation tickets into consideration for secure data transmission. Then, in order to authenticate the access of the mobile users, a tri-lateral pseudonym generation method is used. The mesh client registers its real identity to the operating managers and selects a secret key to generate the pseudonym. By simulation results, we show that the proposed technique enhances the network security.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"156 1","pages":"54"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72701510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable and energy efficient cluster-based architecture for underwater wireless sensor networks 基于集群的水下无线传感器网络可靠节能架构
Q4 Business, Management and Accounting Pub Date : 2018-03-05 DOI: 10.1504/IJMNDI.2018.10011191
D. Anuradha, S. Srivatsa
Underwater wireless sensor network (UWSN) provides a promising solution for discovering the aqueous environment efficiently which operates under many important constraints. At one side, these environments are not sufficient in case of energy efficiency and reliability. So in our paper we propose to develop a reliable and energy efficient cluster-based architecture for UWSN. Here the nodes cluster themselves and forms a cluster head. Next by deploying the courier nodes in the network data is aggregated from the CH. They also enable an intercluster communication to forward the sensed data. This increases the lifetime and the delay is less with the reduced buffer overflow problem.
水下无线传感器网络(UWSN)为有效地发现水中环境提供了一种有前途的解决方案,它在许多重要的约束条件下工作。一方面,这些环境在能源效率和可靠性方面是不够的。因此,在本文中,我们提出了一种可靠且节能的基于集群的UWSN架构。在这里,节点自己聚集并形成一个簇头。接下来,通过在网络中部署信使节点,数据从CH聚合。它们还启用集群间通信来转发感知到的数据。这增加了生命周期,延迟减少了,缓冲区溢出问题也减少了。
{"title":"Reliable and energy efficient cluster-based architecture for underwater wireless sensor networks","authors":"D. Anuradha, S. Srivatsa","doi":"10.1504/IJMNDI.2018.10011191","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011191","url":null,"abstract":"Underwater wireless sensor network (UWSN) provides a promising solution for discovering the aqueous environment efficiently which operates under many important constraints. At one side, these environments are not sufficient in case of energy efficiency and reliability. So in our paper we propose to develop a reliable and energy efficient cluster-based architecture for UWSN. Here the nodes cluster themselves and forms a cluster head. Next by deploying the courier nodes in the network data is aggregated from the CH. They also enable an intercluster communication to forward the sensed data. This increases the lifetime and the delay is less with the reduced buffer overflow problem.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"os-21 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87036172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Mobile Network Design and Innovation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1