Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929496
Ramnath Kumar, G. Geethakumari
Internet Of Things (IoT) has evolved as a computational platform which can facilitate large scale computing using smart devices which are connected to each other over the Internet backbone. The increasing presence of the IoT along with its processing capabilities make this environment a common target of IoT malware attacks. In recent years, many malware detection models have come up which use techniques like machine learning and deep learning. IoT malwares can be detected using either a signature-based approach or by using a behavior-based approach. Although, the signature based approach works well in the detection of known threats, it is not very effective in detecting unknown threats. Most signature based approaches require one to have the domain knowledge and the need to use various pre-processing steps before detecting the malwares. This is not suitable for real time malware detection. In this work, we build a model to tackle the malware detection problem in IoT, using the raw byte-sequences which eliminates the need for domain specific knowledge. This allows us to perform real time malware detection with lesser computational requirements. In this paper, we discuss the various challenges in creating a neural network model and propose ways to address these challenges. The experimental results show that the proposed system can classify the IoT binaries as malware or benign with an accuracy of 99.01%.
{"title":"Temporal Dynamics and Spatial Content in IoT Malware detection","authors":"Ramnath Kumar, G. Geethakumari","doi":"10.1109/TENCON.2019.8929496","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929496","url":null,"abstract":"Internet Of Things (IoT) has evolved as a computational platform which can facilitate large scale computing using smart devices which are connected to each other over the Internet backbone. The increasing presence of the IoT along with its processing capabilities make this environment a common target of IoT malware attacks. In recent years, many malware detection models have come up which use techniques like machine learning and deep learning. IoT malwares can be detected using either a signature-based approach or by using a behavior-based approach. Although, the signature based approach works well in the detection of known threats, it is not very effective in detecting unknown threats. Most signature based approaches require one to have the domain knowledge and the need to use various pre-processing steps before detecting the malwares. This is not suitable for real time malware detection. In this work, we build a model to tackle the malware detection problem in IoT, using the raw byte-sequences which eliminates the need for domain specific knowledge. This allows us to perform real time malware detection with lesser computational requirements. In this paper, we discuss the various challenges in creating a neural network model and propose ways to address these challenges. The experimental results show that the proposed system can classify the IoT binaries as malware or benign with an accuracy of 99.01%.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"209 1","pages":"1590-1595"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75076841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929656
Shraddha Choudhary, K. Hiremath
In this paper, a simple design strategy is presented for designing broadband, polarization insensitive metasurface for radar cross section (RCS) reduction. Two different unit cell structures, circular patch, and loop are chosen to enhance the phase bandwidth. Different phase gradient supercells are designed by positioning these unit cells in a specific phase gradient direction. The eight supercells are then randomly distributed in a checkerboard pattern for further diffusing the incident wave. The proposed metasurface significantly reduce the RCS and demonstrate features such as polarization insensitivity and wideband operational bandwidth.
{"title":"Random Phase Gradient Metasurface for Broadband RCS Reduction","authors":"Shraddha Choudhary, K. Hiremath","doi":"10.1109/TENCON.2019.8929656","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929656","url":null,"abstract":"In this paper, a simple design strategy is presented for designing broadband, polarization insensitive metasurface for radar cross section (RCS) reduction. Two different unit cell structures, circular patch, and loop are chosen to enhance the phase bandwidth. Different phase gradient supercells are designed by positioning these unit cells in a specific phase gradient direction. The eight supercells are then randomly distributed in a checkerboard pattern for further diffusing the incident wave. The proposed metasurface significantly reduce the RCS and demonstrate features such as polarization insensitivity and wideband operational bandwidth.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"1 1","pages":"1452-1454"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74940669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/LARS-SBR-WRE48964.2019.00057
P. Palar, André Schneider de Oliveira, Vinicius Vargas Terres, Julio Endress Ramos
AIR is a climbing robot designed for nondestructive testing and inspection of weld seams in tanks and vessels of the oil and gas industry. In this paper a Fuzzy control system is proposed to a optimal selection of Levels of Autonomy (LoA) at each moment, mixing joystick inputs from an operator and sensor information from the environment to ensure that the movement of tracking weld seams is being achieved while allowing the operator to have full control of the robot's movements without having to control each maneuver manually. Experiments were executed in a simulator environment and are presented along with future ideas for research.
{"title":"Automated Inspection of Pressure Vessels through a Climbing Robot with Sliding Autonomy","authors":"P. Palar, André Schneider de Oliveira, Vinicius Vargas Terres, Julio Endress Ramos","doi":"10.1109/LARS-SBR-WRE48964.2019.00057","DOIUrl":"https://doi.org/10.1109/LARS-SBR-WRE48964.2019.00057","url":null,"abstract":"AIR is a climbing robot designed for nondestructive testing and inspection of weld seams in tanks and vessels of the oil and gas industry. In this paper a Fuzzy control system is proposed to a optimal selection of Levels of Autonomy (LoA) at each moment, mixing joystick inputs from an operator and sensor information from the environment to ensure that the movement of tracking weld seams is being achieved while allowing the operator to have full control of the robot's movements without having to control each maneuver manually. Experiments were executed in a simulator environment and are presented along with future ideas for research.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"140 1","pages":"287-292"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77751604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929427
Febina Ikbal, R. Gopikakumari
Digital images are important data types with an extensive field of application and users are interested in implementing strategies to protect its content from preview or exploitation. The aim of creating an image - watermarking strategy is to fulfil the requirements of both robustness and imperceptibility. An image - watermarking scheme based on Sequency based MRT (SMRT) is proposed in this paper to accomplish this goal. In the embedding phase, the watermark is embedded in the SMRT of the grayscale cover image. The value of the scaling factor determines the embedded strength of the watermark. The scaling factor is varied from 0.01 to 1 to evaluate the performance of the methodology. Simulation results reveal that the algorithm outlined has better invisibility and robustness performance.
{"title":"Watermarking using SMRT on Grayscale Images and Attack analysis","authors":"Febina Ikbal, R. Gopikakumari","doi":"10.1109/TENCON.2019.8929427","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929427","url":null,"abstract":"Digital images are important data types with an extensive field of application and users are interested in implementing strategies to protect its content from preview or exploitation. The aim of creating an image - watermarking strategy is to fulfil the requirements of both robustness and imperceptibility. An image - watermarking scheme based on Sequency based MRT (SMRT) is proposed in this paper to accomplish this goal. In the embedding phase, the watermark is embedded in the SMRT of the grayscale cover image. The value of the scaling factor determines the embedded strength of the watermark. The scaling factor is varied from 0.01 to 1 to evaluate the performance of the methodology. Simulation results reveal that the algorithm outlined has better invisibility and robustness performance.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"161 1","pages":"970-975"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77869822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929236
Chandani Naik, M. Siddhartha, J. P. Martin, K. Chandrasekaran
In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.
{"title":"Location Privacy Using Data Obfuscation in Fog Computing","authors":"Chandani Naik, M. Siddhartha, J. P. Martin, K. Chandrasekaran","doi":"10.1109/TENCON.2019.8929236","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929236","url":null,"abstract":"In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"94 1","pages":"1286-1291"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78029239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929727
M. K. Singh, N. Sato, F. Ichihashi, Y. Sankai
Photoacoustic (PA) or optoacoustic imaging can visualize tissue-optical absorbers, especially hemoglobin, with optical contrast and ultrasound (US)-like resolution and imaging depth. Since both PA and US imaging involves US detection, it is straightforward to develop dual-mode imaging systems with unprecedented functional and structural imaging capabilities. Researchers have already demonstrated the potential of utilizing this complementary contrast for several animal imaging experiments and early clinical pilot studies. PA imaging conventionally uses slow, bulky and high-priced lasers as excitation sources. Use of these high-power pulsed lasers is hindering the clinical translation process of this imaging modality with tremendous potential. Advances in solid-state device technology have recently resulted in the development of a new class of high-power light emitting diodes (LEDs) that can be used as fast, robust and affordable pulsed excitation sources for PA imaging. In this paper, we review multiple LED-based PA/US imaging implementations (commercial and lab-made systems) and demonstrate its functional, molecular and structural imaging capabilities using several clinical/preclinical imaging examples. Specific focus will be given to 2D and 3D superficial vasculature and oxygen saturation imaging in multiple in vivo clinical and preclinical studies.
{"title":"Point-of-care functional and molecular imaging using LED-based photoacoustics","authors":"M. K. Singh, N. Sato, F. Ichihashi, Y. Sankai","doi":"10.1109/TENCON.2019.8929727","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929727","url":null,"abstract":"Photoacoustic (PA) or optoacoustic imaging can visualize tissue-optical absorbers, especially hemoglobin, with optical contrast and ultrasound (US)-like resolution and imaging depth. Since both PA and US imaging involves US detection, it is straightforward to develop dual-mode imaging systems with unprecedented functional and structural imaging capabilities. Researchers have already demonstrated the potential of utilizing this complementary contrast for several animal imaging experiments and early clinical pilot studies. PA imaging conventionally uses slow, bulky and high-priced lasers as excitation sources. Use of these high-power pulsed lasers is hindering the clinical translation process of this imaging modality with tremendous potential. Advances in solid-state device technology have recently resulted in the development of a new class of high-power light emitting diodes (LEDs) that can be used as fast, robust and affordable pulsed excitation sources for PA imaging. In this paper, we review multiple LED-based PA/US imaging implementations (commercial and lab-made systems) and demonstrate its functional, molecular and structural imaging capabilities using several clinical/preclinical imaging examples. Specific focus will be given to 2D and 3D superficial vasculature and oxygen saturation imaging in multiple in vivo clinical and preclinical studies.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"19 1","pages":"109-113"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79256453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Available upper limb active prosthetic devices lack any form of sensory feedback. This paper presents development of a vibrotactile sensory feedback system employing the sensory substitution method. Testing the device with amputees and improvement in overall experience of using the device with the developed system is also discussed.
{"title":"A Vibrotactile Sensory Feedback System for Prosthetic devices","authors":"Llewellyn Dsa, Priteem Ranjan Behera, Kumari Priyanka, Anil Nair","doi":"10.1109/TENCON.2019.8929504","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929504","url":null,"abstract":"Available upper limb active prosthetic devices lack any form of sensory feedback. This paper presents development of a vibrotactile sensory feedback system employing the sensory substitution method. Testing the device with amputees and improvement in overall experience of using the device with the developed system is also discussed.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"3 1","pages":"2449-2453"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81519310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929462
M. Lahari, K. Sudha, R. Santhi
MPPT(Maximum Power Point Tracking) algorithm plays a vital role in the operation of a photovoltaic system and hence its implementation is significant. Two MPPT algorithms namely Perturb & Observe and Incremental Conductance, are widely used. In the present work, an attempt is made to model the two widely used MPPT algorithms using Statecharts. Statecharts, which are a combination of Finite State Machine or State Transition Diagram, depth (or insideness), broadcast communication and orthogonality, are a method of modelling real-time systems that require precision in aspects of timing and output. In this paper, statechart models of Perturb & Observe(P&O) and Incremental Conductance algorithms have been developed using the graphical programming approach, LabVIEW Statechart Module. The developed statechart models can be used in any host application of LabVIEW, including FPGA targets (online or simulated FPGA targets) and can also be communicated to circuit models in Multisim environment. Accurate analysis of a P-V system would require a mixed-signal simulation. To achieve this, in the present work, National Instruments (NI) Multisim has been used for modelling of the analog circuitry and NI LabVIEW has been used for effective development and implementation of control algorithm to the model built in Multisim. P-V array behaviour with a boost converter has been modelled in NI Multisim, which is co-simulated with NI LabVIEW. To the same system, the developed statechart models of P&O and Incremental Conductance methods are interfaced for tracking MPP of the PV array. Results have been presented with and without statechart MPPT controller, in varying irradiances and load conditions.
{"title":"Statechart Models of MPPT Controller for a Photo-Voltaic System in Co-Simulation Environment","authors":"M. Lahari, K. Sudha, R. Santhi","doi":"10.1109/TENCON.2019.8929462","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929462","url":null,"abstract":"MPPT(Maximum Power Point Tracking) algorithm plays a vital role in the operation of a photovoltaic system and hence its implementation is significant. Two MPPT algorithms namely Perturb & Observe and Incremental Conductance, are widely used. In the present work, an attempt is made to model the two widely used MPPT algorithms using Statecharts. Statecharts, which are a combination of Finite State Machine or State Transition Diagram, depth (or insideness), broadcast communication and orthogonality, are a method of modelling real-time systems that require precision in aspects of timing and output. In this paper, statechart models of Perturb & Observe(P&O) and Incremental Conductance algorithms have been developed using the graphical programming approach, LabVIEW Statechart Module. The developed statechart models can be used in any host application of LabVIEW, including FPGA targets (online or simulated FPGA targets) and can also be communicated to circuit models in Multisim environment. Accurate analysis of a P-V system would require a mixed-signal simulation. To achieve this, in the present work, National Instruments (NI) Multisim has been used for modelling of the analog circuitry and NI LabVIEW has been used for effective development and implementation of control algorithm to the model built in Multisim. P-V array behaviour with a boost converter has been modelled in NI Multisim, which is co-simulated with NI LabVIEW. To the same system, the developed statechart models of P&O and Incremental Conductance methods are interfaced for tracking MPP of the PV array. Results have been presented with and without statechart MPPT controller, in varying irradiances and load conditions.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"1 1","pages":"581-586"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81889478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929585
Debanjan Konar, S. Bhattacharyya, Sandip Dey, B. K. Panigrahi
A quantum-inspired self-supervised neural network framework titled Quantum-Inspired Optimized Bi-Directional Self-Organizing Neural Network (Opti-QIBDS Net) suitable for fully automated MR image segmentation is suggested in this article. The suggested Opti-QIBDS Net is characterized by Otsu's multi-class level thresholding scheme based optimized Quantum Inspired Multi-level Sigmoidal (Opti-QIMUSIG) activation function. The network layers of the Opti-QIBDS Net architecture are inter-connected through second order neighborhood based topology and constituted by quantum neurons. The intermediate and output layers of the Opti-QIBDS Net framework are inter-connected through counter propagation of quantum states and pixel intensities are self-organized in counter-propagation fashion obviating any external supervision. Quantum observation is carried out at the end to obtain the segmented tumor from the superposition of quantum states. The proposed optimized self-supervised network architecture has been tested on $T_{1} CE$-weighted MR images and found to be very efficient while compared with other supervised and unsupervised approaches.
{"title":"Opti-QIBDS Net: A Quantum-Inspired Optimized Bi-Directional Self-supervised Neural Network Architecture for Automatic Brain MR Image Segmentation","authors":"Debanjan Konar, S. Bhattacharyya, Sandip Dey, B. K. Panigrahi","doi":"10.1109/TENCON.2019.8929585","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929585","url":null,"abstract":"A quantum-inspired self-supervised neural network framework titled Quantum-Inspired Optimized Bi-Directional Self-Organizing Neural Network (Opti-QIBDS Net) suitable for fully automated MR image segmentation is suggested in this article. The suggested Opti-QIBDS Net is characterized by Otsu's multi-class level thresholding scheme based optimized Quantum Inspired Multi-level Sigmoidal (Opti-QIMUSIG) activation function. The network layers of the Opti-QIBDS Net architecture are inter-connected through second order neighborhood based topology and constituted by quantum neurons. The intermediate and output layers of the Opti-QIBDS Net framework are inter-connected through counter propagation of quantum states and pixel intensities are self-organized in counter-propagation fashion obviating any external supervision. Quantum observation is carried out at the end to obtain the segmented tumor from the superposition of quantum states. The proposed optimized self-supervised network architecture has been tested on $T_{1} CE$-weighted MR images and found to be very efficient while compared with other supervised and unsupervised approaches.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"61 1","pages":"761-766"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84477065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/TENCON.2019.8929265
Sagarika Mohanty, Prateekshya Priyadarshini, Sampa Sahoo, B. Sahoo, Srinivas Sethi
Software defined networks provides a global network view with centralized management. To maintain the network configuration, multiple controllers are required. The network performance depends on the optimal number of controllers and their placement. Due to the large size and complexity involved, meta-heuristic algorithms are the probable choice that can solve the problems in an acceptable amount of time. This paper addresses the controller placement problem in SDN by using two meta-heuristic techniques. The objective is to find optimal number and location of controllers in the network while minimizing the propagation latency and optimizing cost. A random approach is adopted for initial placement of controllers. The assignment of switches to the controllers is done based on their shortest distance. Then an efficient genetic algorithm based placement solution is proposed to find the optimal location of controllers which minimizes cost. Our proposed genetic algorithm is different from the standard genetic algorithm in terms of generation and replacement for determining the best cost and the optimal location of controllers. The same experiment is done on simulated annealing (SA) and random method. For evaluation purpose, we have used some real topologies. The results of our enhanced GA performs better compared to simulated annealing and random placement approach.
{"title":"Metaheuristic Techniques for Controller Placement in Software-Defined Networks","authors":"Sagarika Mohanty, Prateekshya Priyadarshini, Sampa Sahoo, B. Sahoo, Srinivas Sethi","doi":"10.1109/TENCON.2019.8929265","DOIUrl":"https://doi.org/10.1109/TENCON.2019.8929265","url":null,"abstract":"Software defined networks provides a global network view with centralized management. To maintain the network configuration, multiple controllers are required. The network performance depends on the optimal number of controllers and their placement. Due to the large size and complexity involved, meta-heuristic algorithms are the probable choice that can solve the problems in an acceptable amount of time. This paper addresses the controller placement problem in SDN by using two meta-heuristic techniques. The objective is to find optimal number and location of controllers in the network while minimizing the propagation latency and optimizing cost. A random approach is adopted for initial placement of controllers. The assignment of switches to the controllers is done based on their shortest distance. Then an efficient genetic algorithm based placement solution is proposed to find the optimal location of controllers which minimizes cost. Our proposed genetic algorithm is different from the standard genetic algorithm in terms of generation and replacement for determining the best cost and the optimal location of controllers. The same experiment is done on simulated annealing (SA) and random method. For evaluation purpose, we have used some real topologies. The results of our enhanced GA performs better compared to simulated annealing and random placement approach.","PeriodicalId":36690,"journal":{"name":"Platonic Investigations","volume":"11 1","pages":"897-902"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80936723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}