Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221897
M. Khan, Ashish Adholiya
– One of the most potential 5G technologies for wireless networks is device-to-device (D2D) communication. It promises peer-to-peer consumers high data speeds, ubiquity, and low latency, energy, and spectrum efficiency. These benefits make it possible for D2D communication to be completely realized in a multi-hop communication scenario. However, the energy efficient multi hop routing is more challenging task. Hence, this research deep reinforcement learning based multi hop routing protocol is introduced. In this, the energy consumption is considered by the proposed double deep Q learning technique for identifying the possible paths. Then, the optimal best path is selected by the proposed Gannet Chimp optimization (GCO) algorithm using multi-objective fitness function. The assessment of the proposed method based on various measures like packet delivery ratio, latency, residual energy, throughput and network lifetime accomplished the values of 99.89, 1.63, 0.98, 64 and 99.69 respectively.
{"title":"Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks","authors":"M. Khan, Ashish Adholiya","doi":"10.22247/ijcna/2023/221897","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221897","url":null,"abstract":"– One of the most potential 5G technologies for wireless networks is device-to-device (D2D) communication. It promises peer-to-peer consumers high data speeds, ubiquity, and low latency, energy, and spectrum efficiency. These benefits make it possible for D2D communication to be completely realized in a multi-hop communication scenario. However, the energy efficient multi hop routing is more challenging task. Hence, this research deep reinforcement learning based multi hop routing protocol is introduced. In this, the energy consumption is considered by the proposed double deep Q learning technique for identifying the possible paths. Then, the optimal best path is selected by the proposed Gannet Chimp optimization (GCO) algorithm using multi-objective fitness function. The assessment of the proposed method based on various measures like packet delivery ratio, latency, residual energy, throughput and network lifetime accomplished the values of 99.89, 1.63, 0.98, 64 and 99.69 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45726687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221904
S. Sebastian, G. Jagatheeshkumar
– One of the notable uses of Wireless Sensor Networks (WSN) is target detection and tracking. The primary objectives of a target tracking system are to improve target tracking precision and network longevity. This paper presents a Trustworthy Target Tracking Scheme (3TS) for WSN. The entire network region is divided into several grids of equal size, with each grid functioning as a cluster. All the grids include the same number of nodes. A Cluster Head (CH) node is selected for each grid based on the level of trust. The CH node determines the minimum number of active nodes per grid and regulates node activity. Together with the active nodes, the CH node identifies and tracks the target. In addition, the CH node informs the surrounding clusters that the target may cross. This concept enhances the accuracy of detection. Utilizing task cycle scheduling and a clustering approach, this work significantly increases the network's lifespan. The performance of the suggested work is justified in terms of detection accuracy, energy consumption, and network lifetime. The experimental findings demonstrate the effectiveness of the proposed method.
{"title":"Energy Efficient Trustworthy Target Tracking Scheme (3TS) based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks","authors":"S. Sebastian, G. Jagatheeshkumar","doi":"10.22247/ijcna/2023/221904","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221904","url":null,"abstract":"– One of the notable uses of Wireless Sensor Networks (WSN) is target detection and tracking. The primary objectives of a target tracking system are to improve target tracking precision and network longevity. This paper presents a Trustworthy Target Tracking Scheme (3TS) for WSN. The entire network region is divided into several grids of equal size, with each grid functioning as a cluster. All the grids include the same number of nodes. A Cluster Head (CH) node is selected for each grid based on the level of trust. The CH node determines the minimum number of active nodes per grid and regulates node activity. Together with the active nodes, the CH node identifies and tracks the target. In addition, the CH node informs the surrounding clusters that the target may cross. This concept enhances the accuracy of detection. Utilizing task cycle scheduling and a clustering approach, this work significantly increases the network's lifespan. The performance of the suggested work is justified in terms of detection accuracy, energy consumption, and network lifetime. The experimental findings demonstrate the effectiveness of the proposed method.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44924911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221900
A. Anitha, S. Mythili
– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.
{"title":"Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication","authors":"A. Anitha, S. Mythili","doi":"10.22247/ijcna/2023/221900","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221900","url":null,"abstract":"– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41714938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221882
R. S, C. .
– The infotainment system curves an innovative mechanism of essential information dissemination for ensuring driving safety and improved driving experiences. However, there are significant challenges in developing an infotainment system to fit into the operational design of advanced technology, e.g
{"title":"Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles","authors":"R. S, C. .","doi":"10.22247/ijcna/2023/221882","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221882","url":null,"abstract":"– The infotainment system curves an innovative mechanism of essential information dissemination for ensuring driving safety and improved driving experiences. However, there are significant challenges in developing an infotainment system to fit into the operational design of advanced technology, e.g","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41853942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221889
D. Deepalakshmi, B. Pushpa
– The Internet of Things (IoT) has transformed how humans engage with technology, allowing pervasive connection and data sharing. In the Wireless Sensor Networks (WSNs) framework, IoT-based applications have been created for several areas, including agriculture, where greenhouse automation has been deployed for enhanced agricultural yields. However, WSNs face significant challenges, such as limited resources, unpredictable communication, and energy consumption. These issues become more pronounced when applied to greenhouse agriculture due to interference, congestion, and quality of service (QoS) requirements. Therefore, efficient routing protocols are crucial to address these challenges. The proposed study addresses the routing issues in IoT-based WSNs (IWSN) for greenhouse agriculture. Specifically, the Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) is proposed as a novel routing protocol to enhance the QoS in IoT-based WSNs. The EIWDR protocol utilizes the intelligent water drop algorithm to optimize the routing path selection. The algorithm prioritizes energy-efficient routing, selects the most reliable path with minimum delay and data loss, and balances network load to prevent congestion. The proposed protocol also uses a modified weight function to improve the routing performance when applied in IWSN. To test the efficacy of the EIWDR, simulation tests were conducted in the NS-3 simulator. The EIWDR protocol fares better regarding network lifetime, packet delivery ratio, energy consumption, and packet delay than other routing protocols. Improved greenhouse agricultural quality of service using IWSN is possible with the help of the proposed EIWDR protocol. With the help of intelligent routing algorithms, network resources are used effectively, data is sent reliably, and overall performance is enhanced.
{"title":"Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN)","authors":"D. Deepalakshmi, B. Pushpa","doi":"10.22247/ijcna/2023/221889","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221889","url":null,"abstract":"– The Internet of Things (IoT) has transformed how humans engage with technology, allowing pervasive connection and data sharing. In the Wireless Sensor Networks (WSNs) framework, IoT-based applications have been created for several areas, including agriculture, where greenhouse automation has been deployed for enhanced agricultural yields. However, WSNs face significant challenges, such as limited resources, unpredictable communication, and energy consumption. These issues become more pronounced when applied to greenhouse agriculture due to interference, congestion, and quality of service (QoS) requirements. Therefore, efficient routing protocols are crucial to address these challenges. The proposed study addresses the routing issues in IoT-based WSNs (IWSN) for greenhouse agriculture. Specifically, the Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) is proposed as a novel routing protocol to enhance the QoS in IoT-based WSNs. The EIWDR protocol utilizes the intelligent water drop algorithm to optimize the routing path selection. The algorithm prioritizes energy-efficient routing, selects the most reliable path with minimum delay and data loss, and balances network load to prevent congestion. The proposed protocol also uses a modified weight function to improve the routing performance when applied in IWSN. To test the efficacy of the EIWDR, simulation tests were conducted in the NS-3 simulator. The EIWDR protocol fares better regarding network lifetime, packet delivery ratio, energy consumption, and packet delay than other routing protocols. Improved greenhouse agricultural quality of service using IWSN is possible with the help of the proposed EIWDR protocol. With the help of intelligent routing algorithms, network resources are used effectively, data is sent reliably, and overall performance is enhanced.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48995452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221890
.. Himanshu, N. Mangla
– According to the analysis, several task scheduling methods have been implemented, such as the Particle Swarm Optimization (PSO) method, which has enhanced the performance of cloud data centers (DCs) in terms of various scheduling metrics. The scheduling issue in cloud computing (CC) is well-known to be NP-hard, with the main challenge arising from the exponential increase in the no. of possible outcomes or groupings as the problem size grows. Therefore, the key aim is to determine secure and optimal solutions for scheduling consumer tasks. In this study, a proposed method called Optimized-Hybrid Medium Access Control Secure Hash Algorithm 3 (O-HMACSHA3) is introduced for CC. The investigation aims to address the issue of reliable resource scheduling access for different tasks in the cloud environment, with a focus on reducing turnaround time (TAT) and energy consumption (EC). The proposed method utilizes optimization with PSO to achieve soft security in resource scheduling. To evaluate its effectiveness, the research method is compared with other task scheduling methods, including PSO and Fruit Fly-Based Simulated Annealing Optimization (FSAO) method, in terms of EC and time. The findings indicate significant improvements in performance metrics, with energy consumption reduced to 47.7 joules and TAT decreased to 316 milliseconds compared to existing methods. This is in contrast to the proposed method, which resulted in 57.3 joules and 479 milliseconds, respectively, for 20 tasks.
{"title":"A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment","authors":".. Himanshu, N. Mangla","doi":"10.22247/ijcna/2023/221890","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221890","url":null,"abstract":"– According to the analysis, several task scheduling methods have been implemented, such as the Particle Swarm Optimization (PSO) method, which has enhanced the performance of cloud data centers (DCs) in terms of various scheduling metrics. The scheduling issue in cloud computing (CC) is well-known to be NP-hard, with the main challenge arising from the exponential increase in the no. of possible outcomes or groupings as the problem size grows. Therefore, the key aim is to determine secure and optimal solutions for scheduling consumer tasks. In this study, a proposed method called Optimized-Hybrid Medium Access Control Secure Hash Algorithm 3 (O-HMACSHA3) is introduced for CC. The investigation aims to address the issue of reliable resource scheduling access for different tasks in the cloud environment, with a focus on reducing turnaround time (TAT) and energy consumption (EC). The proposed method utilizes optimization with PSO to achieve soft security in resource scheduling. To evaluate its effectiveness, the research method is compared with other task scheduling methods, including PSO and Fruit Fly-Based Simulated Annealing Optimization (FSAO) method, in terms of EC and time. The findings indicate significant improvements in performance metrics, with energy consumption reduced to 47.7 joules and TAT decreased to 316 milliseconds compared to existing methods. This is in contrast to the proposed method, which resulted in 57.3 joules and 479 milliseconds, respectively, for 20 tasks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43769118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221885
Thakur Saikumari, Grinson George
Blockchain and cloud-edge computing paradigms have gradually evolved as a profitable alternative for managing patient data in clinical Internet-of-Things (IoT) devices. Various studies are presented to secure medical records in IoT devices using blockchain schemes. Amongst, eHealthChain is developed to handle medical records obtained from clinical IoT systems. It utilizes Hyperledger Fabric as a blockchain policy to accumulate private medical records. The client's medical record is collected by utilizing the OAuth 2.0 protocol that guarantees the client's authority. Besides, a Message Queuing Telemetry Transport (MQTT) protocol is applied to communicate within an IoT platform. The reliability of the medical data is guaranteed by a consensus method called Kafka. However, the standard OAuth 2.0 protocol neglects the client security problem. Though MQTT offers many-to-many transmissions, the restricted sleep time of devices related to the fixed query waiting is ineffective for resource-constrained networks. Hence, the major contributions of this article are: (i) to develop an Enhanced OAuth (EOAuth) 2.0-based protocol which solves the client security problem and (ii) to utilize a protocol called Constrained Application Protocol (CoAP) for reliable transmission. It reduces the user verification time by obtaining more trusted clients according to their trust level. Also, a certified security service is employed to get the client’s input securely and conduct the cryptographic processes. Finally, the implementation findings exhibit that the EOAuth and CoAP achieve higher efficiency than the standard protocols. Index Terms – Blockchain, Cloud-Edge Computing, IoT Networks, eHealthChain, OAuth 2.0, MQTT, Consensus, CoAP, Kafka.
{"title":"An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System","authors":"Thakur Saikumari, Grinson George","doi":"10.22247/ijcna/2023/221885","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221885","url":null,"abstract":"Blockchain and cloud-edge computing paradigms have gradually evolved as a profitable alternative for managing patient data in clinical Internet-of-Things (IoT) devices. Various studies are presented to secure medical records in IoT devices using blockchain schemes. Amongst, eHealthChain is developed to handle medical records obtained from clinical IoT systems. It utilizes Hyperledger Fabric as a blockchain policy to accumulate private medical records. The client's medical record is collected by utilizing the OAuth 2.0 protocol that guarantees the client's authority. Besides, a Message Queuing Telemetry Transport (MQTT) protocol is applied to communicate within an IoT platform. The reliability of the medical data is guaranteed by a consensus method called Kafka. However, the standard OAuth 2.0 protocol neglects the client security problem. Though MQTT offers many-to-many transmissions, the restricted sleep time of devices related to the fixed query waiting is ineffective for resource-constrained networks. Hence, the major contributions of this article are: (i) to develop an Enhanced OAuth (EOAuth) 2.0-based protocol which solves the client security problem and (ii) to utilize a protocol called Constrained Application Protocol (CoAP) for reliable transmission. It reduces the user verification time by obtaining more trusted clients according to their trust level. Also, a certified security service is employed to get the client’s input securely and conduct the cryptographic processes. Finally, the implementation findings exhibit that the EOAuth and CoAP achieve higher efficiency than the standard protocols. Index Terms – Blockchain, Cloud-Edge Computing, IoT Networks, eHealthChain, OAuth 2.0, MQTT, Consensus, CoAP, Kafka.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43617708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221901
S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.
– Nodes running on small batteries in a wireless sensor network (WSN) act as sensors, monitors, and controllers for the entire system. In IoT contexts, these sensor nodes are increasingly common for monitoring, measurement, and control. Minimizing the sensor nodes' energy consumption is essential for maximizing energy conservation and extending the nodes' lifespan. Prolonging the lifetime of a WSN helps cut down on the cost needed to replace or redeploy it. According to reviews of the literature, most of the energy is used for routing and data transfer. This article suggests an "Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks" that combines these two elements to maximize energy efficiency in order to reduce the energy consumption resulting from routing and data transfer. The data transfer method of an "Energy Efficient Hybrid Protocol (EEHP)" is modified to design the I-EEHP. The I-EEHP uses a multihop hierarchical communication method to reduce energy usage. This makes the routing more energy efficient. In addition, this protocol uses a technique based on IEEE 802.15.4 CSMA/CA to exchange data between cluster members, cluster heads, and sink nodes. This aids in node energy conservation, which ultimately increases the lifespan of the network. The efficiency of the proposed I-EEHP was compared with the already existing LEACH, EEHC, and EEHP using the simulation results. The I-EEHP exhibits noteworthy enhancements in network performance with regards to lifetime, energy, overhead, and packet delivery. The I-EEHP is a feasible option for low-cost and low-power WSN applications.
{"title":"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks","authors":"S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.","doi":"10.22247/ijcna/2023/221901","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221901","url":null,"abstract":"– Nodes running on small batteries in a wireless sensor network (WSN) act as sensors, monitors, and controllers for the entire system. In IoT contexts, these sensor nodes are increasingly common for monitoring, measurement, and control. Minimizing the sensor nodes' energy consumption is essential for maximizing energy conservation and extending the nodes' lifespan. Prolonging the lifetime of a WSN helps cut down on the cost needed to replace or redeploy it. According to reviews of the literature, most of the energy is used for routing and data transfer. This article suggests an \"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks\" that combines these two elements to maximize energy efficiency in order to reduce the energy consumption resulting from routing and data transfer. The data transfer method of an \"Energy Efficient Hybrid Protocol (EEHP)\" is modified to design the I-EEHP. The I-EEHP uses a multihop hierarchical communication method to reduce energy usage. This makes the routing more energy efficient. In addition, this protocol uses a technique based on IEEE 802.15.4 CSMA/CA to exchange data between cluster members, cluster heads, and sink nodes. This aids in node energy conservation, which ultimately increases the lifespan of the network. The efficiency of the proposed I-EEHP was compared with the already existing LEACH, EEHC, and EEHP using the simulation results. The I-EEHP exhibits noteworthy enhancements in network performance with regards to lifetime, energy, overhead, and packet delivery. The I-EEHP is a feasible option for low-cost and low-power WSN applications.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45243256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221903
M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq
– The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.
{"title":"Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges","authors":"M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq","doi":"10.22247/ijcna/2023/221903","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221903","url":null,"abstract":"– The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44252286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221891
Darshan B. D., P. C. R.
– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.
{"title":"Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)","authors":"Darshan B. D., P. C. R.","doi":"10.22247/ijcna/2023/221891","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221891","url":null,"abstract":"– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44418747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}