Pub Date : 2018-06-18DOI: 10.1504/IJMNDI.2018.10013510
K. Vijayalakshmi, J. Manickam
In wireless sensor networks (WSN), generally sensors closest to the sink or base station tend to deplete their battery energy faster than other sensors and create an energy hole around the sink. In order to overcome this problem, a mobile data gathering using PSO and minimum covering spanning tree (MDG-PSO-MCST) is proposed. In this technique, multiple sensors are arranged to form clusters. Two SenCars with multiple antennas are deployed in the cluster location and space division multiple access (SDMA) technique is applied for data gathering with energy efficiency. The anchor points are selected for intermediate data collection based on the connectivity and node degree, node compatibility and the distance between the sensors of two adjacent clusters parameters using particle swarm optimisation (PSO) technique. The visiting tour of each Sencars among the selected anchors is performed using the MCST algorithm. By simulation results, we show that the proposed technique minimises the energy consumption and delay, and enhances the network efficiency.
{"title":"Mobile data gathering using PSO and minimum covering spanning tree clustered WSN","authors":"K. Vijayalakshmi, J. Manickam","doi":"10.1504/IJMNDI.2018.10013510","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013510","url":null,"abstract":"In wireless sensor networks (WSN), generally sensors closest to the sink or base station tend to deplete their battery energy faster than other sensors and create an energy hole around the sink. In order to overcome this problem, a mobile data gathering using PSO and minimum covering spanning tree (MDG-PSO-MCST) is proposed. In this technique, multiple sensors are arranged to form clusters. Two SenCars with multiple antennas are deployed in the cluster location and space division multiple access (SDMA) technique is applied for data gathering with energy efficiency. The anchor points are selected for intermediate data collection based on the connectivity and node degree, node compatibility and the distance between the sensors of two adjacent clusters parameters using particle swarm optimisation (PSO) technique. The visiting tour of each Sencars among the selected anchors is performed using the MCST algorithm. By simulation results, we show that the proposed technique minimises the energy consumption and delay, and enhances the network efficiency.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"41 1","pages":"101"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80062249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-18DOI: 10.1504/IJMNDI.2018.10013504
P. Abi, M. Devi, V. R. Uthariaraj
In VANET, security and power control are the two main challenging issues. In existing works on security, yield additional delay and overhead due to complex cryptographic operations. Hence, the objective is to develop a technique which provides higher security and power control in VANET with less complexity, reduced message dropping, delay, and overhead. Hence, in this work, a trust-based security and power control technique for VANET is proposed. In trust-based security, trust degree of each node is estimated in terms of collaboration trust, behavioural trust and reference trust values. Malicious vehicles are monitored by a set of verifiers. For reducing the power consumption, the channel is cooperatively reserved considering the time as well as channel reservation information. Simulation results show that the proposed technique reduces the delay, power consumption and overhead while improving the packet delivery ratio.
{"title":"Collaborative trust-based security and power control techniques for VANET","authors":"P. Abi, M. Devi, V. R. Uthariaraj","doi":"10.1504/IJMNDI.2018.10013504","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013504","url":null,"abstract":"In VANET, security and power control are the two main challenging issues. In existing works on security, yield additional delay and overhead due to complex cryptographic operations. Hence, the objective is to develop a technique which provides higher security and power control in VANET with less complexity, reduced message dropping, delay, and overhead. Hence, in this work, a trust-based security and power control technique for VANET is proposed. In trust-based security, trust degree of each node is estimated in terms of collaboration trust, behavioural trust and reference trust values. Malicious vehicles are monitored by a set of verifiers. For reducing the power consumption, the channel is cooperatively reserved considering the time as well as channel reservation information. Simulation results show that the proposed technique reduces the delay, power consumption and overhead while improving the packet delivery ratio.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"1 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77566197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-18DOI: 10.1504/IJMNDI.2018.10013505
G. Manikandan, U. Sakthi
In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.
{"title":"Dynamic key management system using channel hopping in IEEE 802.15.4 wireless sensor networks","authors":"G. Manikandan, U. Sakthi","doi":"10.1504/IJMNDI.2018.10013505","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013505","url":null,"abstract":"In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"35 1","pages":"73"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78724234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-18DOI: 10.1504/IJMNDI.2018.10007281
Gyanappa A. Walikar, R. Biradar
Mobile ad hoc networks (MANETs) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless radio links. Hybrid routing strategy is widely used in hierarchical routing protocols to reduce the control overheads and packet delivery delay in MANETs. In this paper, we propose zone-based energy aware hybrid multicast routing scheme (ZEHMRP) for MANET. Our scheme operates in the following phases: 1) computation of node remaining energy (RE) by designing energy model; 2) prune the nodes having remaining energy less than predefined threshold value; 3) discovery of multiple routes using request and reply packets; 4) selection of stable route among multiple routes by considering node remaining energy and density; 5) route maintenance for route breaks and node failures; 6) simulation evaluation for various parameters. It is observed that ZEHMRP outperforms the zone routing protocol (ZRP) for various parameters like packet delivery ratio, end-to-end delay, jitter, and control overheads.
{"title":"Energy aware hybrid multicast routing in mobile ad hoc networks: zone-based approach","authors":"Gyanappa A. Walikar, R. Biradar","doi":"10.1504/IJMNDI.2018.10007281","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10007281","url":null,"abstract":"Mobile ad hoc networks (MANETs) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless radio links. Hybrid routing strategy is widely used in hierarchical routing protocols to reduce the control overheads and packet delivery delay in MANETs. In this paper, we propose zone-based energy aware hybrid multicast routing scheme (ZEHMRP) for MANET. Our scheme operates in the following phases: 1) computation of node remaining energy (RE) by designing energy model; 2) prune the nodes having remaining energy less than predefined threshold value; 3) discovery of multiple routes using request and reply packets; 4) selection of stable route among multiple routes by considering node remaining energy and density; 5) route maintenance for route breaks and node failures; 6) simulation evaluation for various parameters. It is observed that ZEHMRP outperforms the zone routing protocol (ZRP) for various parameters like packet delivery ratio, end-to-end delay, jitter, and control overheads.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"42 1","pages":"80"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85280152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-18DOI: 10.1504/IJMNDI.2018.10013508
L. LeBlanc
The occurrence of natural disasters and emergencies creates the need for communication between and among emergency responders, the region's population, and other governmental and non-governmental agencies and organisations. Key information that is to be disseminated among these groups must rely on communication networks that may have been rendered partially or fully inoperable. In these scenarios, temporary wireless telecommunications infrastructure can be utilised to provide the links necessary for critical communications. While the deployment of temporary mobile networks and other wireless equipment during the aftermath of disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimisation effort involved with respect to maximising key performance measures of the deployment or minimising overall cost to deploy. This work does not focus on the question of what entity will operate the portable base stations or wireless equipment utilised during a disaster, only the question of optimising placement for planning and real time management. I examine the modelling and optimisation of the deployment of a wireless infrastructure prior to, during, and after an emergency or crisis.
{"title":"A generalised modelling discussion for portable wireless base stations during emergencies","authors":"L. LeBlanc","doi":"10.1504/IJMNDI.2018.10013508","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10013508","url":null,"abstract":"The occurrence of natural disasters and emergencies creates the need for communication between and among emergency responders, the region's population, and other governmental and non-governmental agencies and organisations. Key information that is to be disseminated among these groups must rely on communication networks that may have been rendered partially or fully inoperable. In these scenarios, temporary wireless telecommunications infrastructure can be utilised to provide the links necessary for critical communications. While the deployment of temporary mobile networks and other wireless equipment during the aftermath of disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimisation effort involved with respect to maximising key performance measures of the deployment or minimising overall cost to deploy. This work does not focus on the question of what entity will operate the portable base stations or wireless equipment utilised during a disaster, only the question of optimising placement for planning and real time management. I examine the modelling and optimisation of the deployment of a wireless infrastructure prior to, during, and after an emergency or crisis.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"11 16 1","pages":"61"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78404724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-05DOI: 10.1504/IJMNDI.2018.10011193
M. Nuka, M. Naidu
The cost effort of a global system for mobile communications (GSM) network is to be minimised for meeting effectively and efficiently the service requirements of ever increasing mobile subscriber's base. The period of temporary storage of subscribers' profiles in visitor location register (VLR) at a mobile switching centre (MSC) affects the cost of GSM network. This research study proposes a sliding window method for determining the storage period of profiles in VLR that minimises the network cost of GSM network. Further, this study examined and evaluated the computational efforts on proposed method. The proposed method proves to be better than the reported set intersection method.
{"title":"Minimising network cost by employing sliding window method at mobile switching centres in GSM network","authors":"M. Nuka, M. Naidu","doi":"10.1504/IJMNDI.2018.10011193","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011193","url":null,"abstract":"The cost effort of a global system for mobile communications (GSM) network is to be minimised for meeting effectively and efficiently the service requirements of ever increasing mobile subscriber's base. The period of temporary storage of subscribers' profiles in visitor location register (VLR) at a mobile switching centre (MSC) affects the cost of GSM network. This research study proposes a sliding window method for determining the storage period of profiles in VLR that minimises the network cost of GSM network. Further, this study examined and evaluated the computational efforts on proposed method. The proposed method proves to be better than the reported set intersection method.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"104 1","pages":"45"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79168115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-05DOI: 10.1504/IJMNDI.2018.10011192
J. Govindasamy, Samundiswary Punniakodi
Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.
{"title":"Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor networks","authors":"J. Govindasamy, Samundiswary Punniakodi","doi":"10.1504/IJMNDI.2018.10011192","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011192","url":null,"abstract":"Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"56 1","pages":"36"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89212401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-05DOI: 10.1504/IJMNDI.2018.10011190
K. Subramaniam, L. Tamilselvan
Multicasting is influenced with increasing importance of real-time and multimedia with different quality of service (QoS) requirement. But mobile ad hoc network (MANET) has limited bandwidth and also the physical channel results in unpredictable resource fluctuation and interference. In order to overcome these issues, resource allocation and rate adaption technique for multicast of real-time traffic in MANET is proposed. In this technique, reservation protocol is used while transmitting real-time data packets in order to reserve future slots and hence, it can be deployed in particular time slot. A three hop slot assignment mechanism is adopted to provide an interference free model. Also, normalised transmission rate is used to characterise transmission rate adoption. The benefit of using this technique is that even if a single copy of data is transmitted by sender, multicast receiver can hear the transmitted signal for each multimedia layer.
{"title":"Resource allocation and rate adaptation for multicast of real-time traffic in MANET","authors":"K. Subramaniam, L. Tamilselvan","doi":"10.1504/IJMNDI.2018.10011190","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011190","url":null,"abstract":"Multicasting is influenced with increasing importance of real-time and multimedia with different quality of service (QoS) requirement. But mobile ad hoc network (MANET) has limited bandwidth and also the physical channel results in unpredictable resource fluctuation and interference. In order to overcome these issues, resource allocation and rate adaption technique for multicast of real-time traffic in MANET is proposed. In this technique, reservation protocol is used while transmitting real-time data packets in order to reserve future slots and hence, it can be deployed in particular time slot. A three hop slot assignment mechanism is adopted to provide an interference free model. Also, normalised transmission rate is used to characterise transmission rate adoption. The benefit of using this technique is that even if a single copy of data is transmitted by sender, multicast receiver can hear the transmitted signal for each multimedia layer.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"201 1","pages":"17"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88118929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-05DOI: 10.1504/IJMNDI.2018.10011194
G. Akilarasu, S. Shalinie
In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and privacy attacks. In order to overcome these issues, in this paper, we propose a privacy preserving protocol for secure routing in WMN. In this technique, when a source node wants to transmit privacy information, it performs a secure routing based on the security level of the nodes. Also, it takes direct and delegation tickets into consideration for secure data transmission. Then, in order to authenticate the access of the mobile users, a tri-lateral pseudonym generation method is used. The mesh client registers its real identity to the operating managers and selects a secret key to generate the pseudonym. By simulation results, we show that the proposed technique enhances the network security.
{"title":"Privacy preserving protocol for secure routing in wireless mesh networks","authors":"G. Akilarasu, S. Shalinie","doi":"10.1504/IJMNDI.2018.10011194","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011194","url":null,"abstract":"In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and privacy attacks. In order to overcome these issues, in this paper, we propose a privacy preserving protocol for secure routing in WMN. In this technique, when a source node wants to transmit privacy information, it performs a secure routing based on the security level of the nodes. Also, it takes direct and delegation tickets into consideration for secure data transmission. Then, in order to authenticate the access of the mobile users, a tri-lateral pseudonym generation method is used. The mesh client registers its real identity to the operating managers and selects a secret key to generate the pseudonym. By simulation results, we show that the proposed technique enhances the network security.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"156 1","pages":"54"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72701510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-05DOI: 10.1504/IJMNDI.2018.10011191
D. Anuradha, S. Srivatsa
Underwater wireless sensor network (UWSN) provides a promising solution for discovering the aqueous environment efficiently which operates under many important constraints. At one side, these environments are not sufficient in case of energy efficiency and reliability. So in our paper we propose to develop a reliable and energy efficient cluster-based architecture for UWSN. Here the nodes cluster themselves and forms a cluster head. Next by deploying the courier nodes in the network data is aggregated from the CH. They also enable an intercluster communication to forward the sensed data. This increases the lifetime and the delay is less with the reduced buffer overflow problem.
{"title":"Reliable and energy efficient cluster-based architecture for underwater wireless sensor networks","authors":"D. Anuradha, S. Srivatsa","doi":"10.1504/IJMNDI.2018.10011191","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10011191","url":null,"abstract":"Underwater wireless sensor network (UWSN) provides a promising solution for discovering the aqueous environment efficiently which operates under many important constraints. At one side, these environments are not sufficient in case of energy efficiency and reliability. So in our paper we propose to develop a reliable and energy efficient cluster-based architecture for UWSN. Here the nodes cluster themselves and forms a cluster head. Next by deploying the courier nodes in the network data is aggregated from the CH. They also enable an intercluster communication to forward the sensed data. This increases the lifetime and the delay is less with the reduced buffer overflow problem.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"os-21 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87036172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}