首页 > 最新文献

2013 International Conference on Intelligent Systems and Signal Processing (ISSP)最新文献

英文 中文
An intelligent technique based on code algorithm for determination of optimum gain values of PID controller in an AGC system 一种基于编码算法的AGC系统PID控制器最佳增益的智能确定技术
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526870
K. Chandrasekhar, K. Vaisakh
Automatic generation control (AGC) of a power system provides power demand signals for power generators to control frequency and tie-line power flow due to the large load changes or other disturbances. Occurrence of large real power imbalance causes large frequency deviations from its nominal value which may be a threat to secure operation of power system. To avoid such situation, emergency control to maintain the system frequency using composite differential evolution (CODE) based proportional integral-derivative (PID) controller is proposed in this paper. CODE based optimum gains give better optimal transient response of frequency and tie line power changes compared to particle swarm optimization and classical DE based PID gains.
自动发电控制(AGC)是电力系统中由于负荷变化较大或受到其他干扰,为发电机组提供控制频率和配线潮流的电力需求信号。实际功率出现较大的不平衡,导致频率偏离标称值较大,对电力系统的安全运行构成威胁。为了避免这种情况,本文提出了基于复合微分进化(CODE)的比例积分导数(PID)控制器来维持系统频率的紧急控制。与粒子群优化和经典的基于DE的PID增益相比,基于CODE的最优增益可以获得更好的频率和线路功率变化的最优瞬态响应。
{"title":"An intelligent technique based on code algorithm for determination of optimum gain values of PID controller in an AGC system","authors":"K. Chandrasekhar, K. Vaisakh","doi":"10.1109/ISSP.2013.6526870","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526870","url":null,"abstract":"Automatic generation control (AGC) of a power system provides power demand signals for power generators to control frequency and tie-line power flow due to the large load changes or other disturbances. Occurrence of large real power imbalance causes large frequency deviations from its nominal value which may be a threat to secure operation of power system. To avoid such situation, emergency control to maintain the system frequency using composite differential evolution (CODE) based proportional integral-derivative (PID) controller is proposed in this paper. CODE based optimum gains give better optimal transient response of frequency and tie line power changes compared to particle swarm optimization and classical DE based PID gains.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of new scheduling algorithm LLF_DM and its comparison with existing EDF, LLF, and DM algorithms for periodic tasks 设计新的周期任务调度算法LLF_DM,并与现有的EDF、LLF和DM算法进行比较
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526871
V. Prajapati, Apurva Shah, Prem Balani
The most challenging part of scheduling in real time systems is to achieve successful completion of a job before its deadline. Mainly two categories of algorithms i.e. static and dynamic tried to achieve this but both categories failed either in under-loaded condition or in over-loaded condition. Dynamic algorithms achieve optimum results in under-loaded condition but fail to achieve the same in over-loaded condition. On the other side static algorithms do not achieve optimum performance in underloaded condition but perform well in over-loaded condition. So our idea behind designing new scheduling algorithm is to achieve optimum performance in under-loaded condition and to achieve high performance in over-loaded condition. To achieve this we schedule jobs according to dynamic scheduling algorithm LLF (Least Laxity First) when system is under-loaded and when system becomes overloaded we schedule jobs according to static algorithm DM (Deadline Monotonic). In this paper we have proposed a LLF_DM algorithm which achieves optimum performance in under-loaded condition and achieves very high performance in over loaded condition.
实时系统调度中最具挑战性的部分是在截止日期之前成功完成任务。主要有两类算法,即静态和动态,试图实现这一点,但这两类算法在负载不足或过载的情况下都失败了。动态算法在欠载情况下能达到最优效果,而在过载情况下不能达到最优效果。另一方面,静态算法在欠载情况下不能达到最佳性能,但在过载情况下表现良好。因此,我们设计新的调度算法的思想是在低负载条件下实现最优性能,在过载条件下实现高性能。为了实现这一目标,我们在系统负载不足时根据动态调度算法LLF (Least Laxity First)调度作业,当系统过载时根据静态调度算法DM (Deadline Monotonic)调度作业。在本文中,我们提出了一种LLF_DM算法,该算法在低负载条件下达到最佳性能,在过载条件下达到非常高的性能。
{"title":"Design of new scheduling algorithm LLF_DM and its comparison with existing EDF, LLF, and DM algorithms for periodic tasks","authors":"V. Prajapati, Apurva Shah, Prem Balani","doi":"10.1109/ISSP.2013.6526871","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526871","url":null,"abstract":"The most challenging part of scheduling in real time systems is to achieve successful completion of a job before its deadline. Mainly two categories of algorithms i.e. static and dynamic tried to achieve this but both categories failed either in under-loaded condition or in over-loaded condition. Dynamic algorithms achieve optimum results in under-loaded condition but fail to achieve the same in over-loaded condition. On the other side static algorithms do not achieve optimum performance in underloaded condition but perform well in over-loaded condition. So our idea behind designing new scheduling algorithm is to achieve optimum performance in under-loaded condition and to achieve high performance in over-loaded condition. To achieve this we schedule jobs according to dynamic scheduling algorithm LLF (Least Laxity First) when system is under-loaded and when system becomes overloaded we schedule jobs according to static algorithm DM (Deadline Monotonic). In this paper we have proposed a LLF_DM algorithm which achieves optimum performance in under-loaded condition and achieves very high performance in over loaded condition.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Virtual offense in Maharashtra (India): Legend and truth? 印度马哈拉施特拉邦的虚拟进攻:传说和真相?
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526927
Mr. D. S. Jadhav
There is a common reaction that Internet crime is an highly developed category of crime that has not yet break into developed state in India like Maharashtra. The cheerful environment of the Internet in which everybody distributes whatever thing at anytime poses a serious defense hazard for every state in India. Alas, there are no official reports about this category of crime for Maharashtra. Possibly will this indicate that it does not exist there? Here we carry out an independent investigate to find out whether cyber crimes have affected public in Maharashtra and if so, to find out where they are reported.
有一种普遍的反应是,网络犯罪是一种高度发达的犯罪类别,尚未进入印度马哈拉施特拉邦等发达国家。互联网的欢快环境,任何人都可以在任何时候分发任何东西,这对印度的每个州都构成了严重的国防威胁。唉,马哈拉施特拉邦没有关于这类犯罪的官方报告。这可能表明它不存在吗?在这里,我们进行了一项独立调查,以查明网络犯罪是否影响了马哈拉施特拉邦的公众,如果是的话,找出他们的报告地点。
{"title":"Virtual offense in Maharashtra (India): Legend and truth?","authors":"Mr. D. S. Jadhav","doi":"10.1109/ISSP.2013.6526927","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526927","url":null,"abstract":"There is a common reaction that Internet crime is an highly developed category of crime that has not yet break into developed state in India like Maharashtra. The cheerful environment of the Internet in which everybody distributes whatever thing at anytime poses a serious defense hazard for every state in India. Alas, there are no official reports about this category of crime for Maharashtra. Possibly will this indicate that it does not exist there? Here we carry out an independent investigate to find out whether cyber crimes have affected public in Maharashtra and if so, to find out where they are reported.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122492370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Significance of stop word elimination in meta search engine 停止词消除在元搜索引擎中的意义
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526873
B. Patel, D. Shah
Various known meta search engines are built for specific search results. Based on search query meta search engine returns an aggregate list of search results from number of search engines. In this article, significance of stop word elimination for better search results in meta search engine is discussed, and new model of meta search engine is proposed. The output by proposed meta search engine and existing meta search engine like dogpile; with stop words and without stop words; are compared. The result shows that retrieved links in new meta search engine, with and without stop words, is more than 90% same where as by existing meta search engine like dogpile differ with more than 90%.
各种已知的元搜索引擎是为特定的搜索结果而构建的。基于搜索查询,元搜索引擎返回来自多个搜索引擎的搜索结果的聚合列表。本文讨论了元搜索引擎中停词消去对提高搜索结果的意义,并提出了元搜索引擎的新模型。提出的元搜索引擎和现有元搜索引擎(如dogpile)的输出;有停顿词,也有不停顿词;进行了比较。结果表明,在新的元搜索引擎中检索到的链接,无论是否有停止词,都有90%以上的相同,而现有的元搜索引擎如dogpile的检索结果相差90%以上。
{"title":"Significance of stop word elimination in meta search engine","authors":"B. Patel, D. Shah","doi":"10.1109/ISSP.2013.6526873","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526873","url":null,"abstract":"Various known meta search engines are built for specific search results. Based on search query meta search engine returns an aggregate list of search results from number of search engines. In this article, significance of stop word elimination for better search results in meta search engine is discussed, and new model of meta search engine is proposed. The output by proposed meta search engine and existing meta search engine like dogpile; with stop words and without stop words; are compared. The result shows that retrieved links in new meta search engine, with and without stop words, is more than 90% same where as by existing meta search engine like dogpile differ with more than 90%.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Improved histogram bin shifting based reversible watermarking 改进的基于直方图bin移位的可逆水印
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526875
P. Nagarju, R. Naskar, R. Chakraborty
Reversible w atermarking constitutes a class of fragile digital watermarking techniques that find application in authentication of medical and military imagery. Reversible watermarking techniques ensure that after watermark extraction, the original cover image can be recovered from the watermarked image pixel-by-pixel. In this paper, we propose a novel reversible watermarking technique as an improved modification of the existing histogram bin shifting technique. We develop an optimal selection scheme for the “embedding point” (grayscale value of the pixels hosting the watermark), and take advantage of multiple zero frequency pixel values (if available) in the given image to embed the watermark. Experimental results for a set of images show that the adoption of these techniques improves the peak signal-to-noise ratio (PSNR) of the watermarked image compared to previously proposed histogram bin shifting techniques.
可逆水印是一类脆弱的数字水印技术,应用于医学和军事图像的认证。可逆水印技术保证了水印提取后,可以逐像素地从水印图像中恢复原封面图像。本文提出了一种新的可逆水印技术,作为现有直方图本移技术的改进改进。我们开发了“嵌入点”(承载水印的像素的灰度值)的最佳选择方案,并利用给定图像中的多个零频率像素值(如果可用)来嵌入水印。一组图像的实验结果表明,与之前提出的直方图bin移位技术相比,采用这些技术提高了水印图像的峰值信噪比(PSNR)。
{"title":"Improved histogram bin shifting based reversible watermarking","authors":"P. Nagarju, R. Naskar, R. Chakraborty","doi":"10.1109/ISSP.2013.6526875","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526875","url":null,"abstract":"Reversible w atermarking constitutes a class of fragile digital watermarking techniques that find application in authentication of medical and military imagery. Reversible watermarking techniques ensure that after watermark extraction, the original cover image can be recovered from the watermarked image pixel-by-pixel. In this paper, we propose a novel reversible watermarking technique as an improved modification of the existing histogram bin shifting technique. We develop an optimal selection scheme for the “embedding point” (grayscale value of the pixels hosting the watermark), and take advantage of multiple zero frequency pixel values (if available) in the given image to embed the watermark. Experimental results for a set of images show that the adoption of these techniques improves the peak signal-to-noise ratio (PSNR) of the watermarked image compared to previously proposed histogram bin shifting techniques.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Wavelet based image fusion techniques 基于小波的图像融合技术
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526878
P. M. Pradnya, D. Sachin
The fusion of images is the process of combining two or more images into a single image retaining important features from each. Fusion is an important technique within many disparate fields such as remote sensing, robotics and medical applications. The result of image fusion is a single image which is more suitable for human and machine perception or further image-processing tasks. The image fusion algorithm based on wavelet transform is proposed to prove the geometric resolution of the images, in which two images to be processed are firstly decomposed into sub images and then the information is performed using these images under the certain criteria and finally these sub images are reconstructed into result image with plentiful information. In this paper three different image fusion methods based wavelet transform are implemented. And the results are compared and best method is found.
图像融合是将两幅或多幅图像合并成一幅图像的过程,其中保留了每幅图像的重要特征。融合是许多不同领域的重要技术,如遥感、机器人和医疗应用。图像融合的结果是一个更适合人类和机器感知或进一步的图像处理任务的单一图像。为了证明图像的几何分辨率,提出了基于小波变换的图像融合算法,该算法首先将待处理的两幅图像分解成子图像,然后根据一定的准则对这些子图像进行信息处理,最后将这些子图像重构成信息丰富的结果图像。本文实现了三种基于小波变换的图像融合方法。并对结果进行了比较,找到了最佳方法。
{"title":"Wavelet based image fusion techniques","authors":"P. M. Pradnya, D. Sachin","doi":"10.1109/ISSP.2013.6526878","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526878","url":null,"abstract":"The fusion of images is the process of combining two or more images into a single image retaining important features from each. Fusion is an important technique within many disparate fields such as remote sensing, robotics and medical applications. The result of image fusion is a single image which is more suitable for human and machine perception or further image-processing tasks. The image fusion algorithm based on wavelet transform is proposed to prove the geometric resolution of the images, in which two images to be processed are firstly decomposed into sub images and then the information is performed using these images under the certain criteria and finally these sub images are reconstructed into result image with plentiful information. In this paper three different image fusion methods based wavelet transform are implemented. And the results are compared and best method is found.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Applications of MFCC and Vector Quantization in speaker recognition MFCC和矢量量化在说话人识别中的应用
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526896
A. Gupta, H. Gupta
In speaker recognition, most of the computation originates from the likelihood computations between feature vectors of the unknown speaker and the models in the database. In this paper, we concentrate on optimizing Mel Frequency Cepstral Coefficient (MFCC) for feature extraction and Vector Quantization (VQ) for feature modeling. We reduce the number of feature vectors by pre-quantizing the test sequence prior to matching, and number of speakers by ruling out unlikely speakers during recognition process. The two important parameters, Recognition rate and minimized Average Distance between the samples, depends on the codebook size and the number of cepstral coefficients. We find, that this approach yields significant performance when the changes are made in the number of mfcc's and the codebook size. Recognition rate is found to reach upto 89% and the distortion reduced upto 69%.
在说话人识别中,大部分的计算来源于未知说话人的特征向量与数据库中的模型之间的似然计算。在本文中,我们专注于优化Mel频率倒谱系数(MFCC)用于特征提取和矢量量化(VQ)用于特征建模。我们在匹配之前通过对测试序列进行预量化来减少特征向量的数量,在识别过程中通过排除不可能的说话人来减少说话人的数量。识别率和样本间最小平均距离这两个重要参数取决于码本的大小和倒谱系数的数量。我们发现,当mfcc的数量和码本大小发生变化时,这种方法产生了显著的性能。识别率高达89%,失真率降低了69%。
{"title":"Applications of MFCC and Vector Quantization in speaker recognition","authors":"A. Gupta, H. Gupta","doi":"10.1109/ISSP.2013.6526896","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526896","url":null,"abstract":"In speaker recognition, most of the computation originates from the likelihood computations between feature vectors of the unknown speaker and the models in the database. In this paper, we concentrate on optimizing Mel Frequency Cepstral Coefficient (MFCC) for feature extraction and Vector Quantization (VQ) for feature modeling. We reduce the number of feature vectors by pre-quantizing the test sequence prior to matching, and number of speakers by ruling out unlikely speakers during recognition process. The two important parameters, Recognition rate and minimized Average Distance between the samples, depends on the codebook size and the number of cepstral coefficients. We find, that this approach yields significant performance when the changes are made in the number of mfcc's and the codebook size. Recognition rate is found to reach upto 89% and the distortion reduced upto 69%.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
ADPLL design and implementation on FPGA ADPLL的FPGA设计与实现
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526917
K. Lata, M. Kumar
This paper presents the ADPLL design using Verilog and its implementation on FPGA. ADPLL is designed using Verilog HDL. Xilinx ISE 10.1 Simulator is used for simulating Verilog Code. This paper gives details of the basic blocks of an ADPLL. In this paper, implementation of ADPLL is described in detail. Its simulation results using Xilinx are also discussed. It also presents the FPGA implementation of ADPLL design on Xilinx vertex5 xc5vlx110t chip and its results. The ADPLL is designed of 200 kHz central frequency. The operational frequency range of ADPLL is 189 Hz to 215 kHz, which is lock range of the design.
本文介绍了基于Verilog的ADPLL设计及其在FPGA上的实现。ADPLL采用Verilog HDL进行设计。Xilinx ISE 10.1 Simulator用于模拟Verilog Code。本文详细介绍了ADPLL的基本模块。本文详细介绍了ADPLL的实现方法。文中还讨论了Xilinx软件的仿真结果。并给出了在Xilinx vertex5 xc5vlx110t芯片上ADPLL设计的FPGA实现及其结果。ADPLL的中心频率为200khz。ADPLL的工作频率范围为189hz ~ 215khz,是本设计的锁定范围。
{"title":"ADPLL design and implementation on FPGA","authors":"K. Lata, M. Kumar","doi":"10.1109/ISSP.2013.6526917","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526917","url":null,"abstract":"This paper presents the ADPLL design using Verilog and its implementation on FPGA. ADPLL is designed using Verilog HDL. Xilinx ISE 10.1 Simulator is used for simulating Verilog Code. This paper gives details of the basic blocks of an ADPLL. In this paper, implementation of ADPLL is described in detail. Its simulation results using Xilinx are also discussed. It also presents the FPGA implementation of ADPLL design on Xilinx vertex5 xc5vlx110t chip and its results. The ADPLL is designed of 200 kHz central frequency. The operational frequency range of ADPLL is 189 Hz to 215 kHz, which is lock range of the design.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125419055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Security attacks in wireless sensor networks: A survey 无线传感器网络中的安全攻击:综述
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526929
Manish Patel, A. Aggarwal
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.
无线传感器网络(WSN)由于其在军事和民用领域的广泛应用,正在成为未来的主流技术。这些网络很容易受到安全攻击,因为一旦部署,这些网络就无人值守和不受保护。一些固有的特性,如有限的电池和低内存,使得传感器网络无法使用传统的安全解决方案。这些网络中存在着大量的攻击,可以分为路由攻击和数据流量攻击。对传感器节点的数据攻击主要有虫洞攻击、干扰攻击、选择性转发攻击、天坑攻击和Sybil攻击。在本文中,我们讨论了所有这些攻击以及防御这些攻击的一些缓解方案。
{"title":"Security attacks in wireless sensor networks: A survey","authors":"Manish Patel, A. Aggarwal","doi":"10.1109/ISSP.2013.6526929","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526929","url":null,"abstract":"Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Lifetime prolonging in LEACH protocol for wireless sensor networks 无线传感器网络LEACH协议的寿命延长
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526933
Ashish Christian, H. Soni
The expeditious transformation of hardware technology has empowered the reinforcement of small, inexpensive, static and dynamic powerful sensor nodes, which are capable of sensing, computation and wireless communication on wide range of frequency with various modulation technique. This revolutionizes the implementation of wireless sensor network for considerable dimensions like overseeing some geographic area and parameter collection task. However, a limited energy constraint presents a major challenge such vision to become reality. In this paper we have attempted to explain how the wireless sensor networks are formed and how the various nodes present in those networks act as interdependent communicating nodes. LEACH (Low Energy Adaptive Clustering Hierarchy) [2] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. We are proposing the iLeach protocol (Improved Low-Energy Adaptive Clustering Hierarchy) and comparing to LEACH protocol. Lifetime of sensors is evaluated in terms of FND (First Node Dies) and HND (Half of the Nodes Die) [11] which will take care for the reliability and power efficiency of a wireless sensor network.
硬件技术的飞速发展使小型、廉价、静态和动态功能强大的传感器节点得以加强,这些传感器节点能够通过各种调制技术在宽频率范围内进行传感、计算和无线通信。这就彻底改变了无线传感器网络在相当大的维度上的实现,比如监控某些地理区域和参数收集任务。然而,有限的能源限制对这一愿景的实现提出了重大挑战。在本文中,我们试图解释无线传感器网络是如何形成的,以及这些网络中存在的各种节点如何作为相互依赖的通信节点。LEACH (Low Energy Adaptive Clustering Hierarchy,低能量自适应聚类结构)[2]是一种流行的基于聚类的结构,在无线传感器网络中被广泛提出。提出了改进的低能量自适应聚类层次结构(iLeach)协议,并与LEACH协议进行了比较。传感器的寿命是根据FND(第一节点死亡)和HND(一半节点死亡)来评估的[11],这将照顾到无线传感器网络的可靠性和功率效率。
{"title":"Lifetime prolonging in LEACH protocol for wireless sensor networks","authors":"Ashish Christian, H. Soni","doi":"10.1109/ISSP.2013.6526933","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526933","url":null,"abstract":"The expeditious transformation of hardware technology has empowered the reinforcement of small, inexpensive, static and dynamic powerful sensor nodes, which are capable of sensing, computation and wireless communication on wide range of frequency with various modulation technique. This revolutionizes the implementation of wireless sensor network for considerable dimensions like overseeing some geographic area and parameter collection task. However, a limited energy constraint presents a major challenge such vision to become reality. In this paper we have attempted to explain how the wireless sensor networks are formed and how the various nodes present in those networks act as interdependent communicating nodes. LEACH (Low Energy Adaptive Clustering Hierarchy) [2] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. We are proposing the iLeach protocol (Improved Low-Energy Adaptive Clustering Hierarchy) and comparing to LEACH protocol. Lifetime of sensors is evaluated in terms of FND (First Node Dies) and HND (Half of the Nodes Die) [11] which will take care for the reliability and power efficiency of a wireless sensor network.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1