Cost Based Energy Efficient Routing Algorithm for Wireless Body Area Networks
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.1-5, Aug-2015
Abstract
WBAN is a forthcoming technology which utilizes the wireless sensor node to execute real time wearable health monitoring of patient. In such network traffic routing placed an important role together with the positioning of relay nodes which collect the information from children node and send it towards the sink. In this paper we discuss how the wireless body area networks are used in health care relevance by using multiple sensor nodes. The paper discuss the calculation of energy and cost function. Our proposed cost function computes the reliability of path on basis on factor critical. Simulation result demonstrate that over proposed protocol highest energy stability period and cost effective.
Key-Words / Index Term
WBANs, Cost Function, Throughput, Sink, Residual Energy
References
[1]. W. Joseph, B. Braem, E. Reusens, B. Latre, L. Martens, I. Moerman, and C. Blondia, (2011) “Design of Energy Efficient Topologies for Wireless On-Body Channel,” Wireless. Conf. 2011-Sustainable Wireless Technology. (European Wireless), 11th Eur., vol. 5, pp. 1–7.
[2]. J. Elias and A. Mehaoua, “Energy-aware topology design for wireless body area networks,” in 2012 IEEE International Conference on Communications (ICC),vol.2 pp. 3409–3410.
[3]. Q. Nadeem, N. Javaid, S. N. Mohammad, M. Y. Khan1, S. Sarfraz and M. Gull, 2013 “SIMPLE: Stable Increased-throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area Networks.,” Arxiv california university., vol. 19, pp.1-4.
[4]. J. I. Bangash, A. H. Abdullah, M. A. Razzaque, and A. W. Khan, 2014“Reliability Aware Routing for Intra-Wireless Body Sensor Networks,” Int. J. Distrib. Sensors Networks, vol 1 pp.1-10.
[5]. G. R. Tsouri, A. Prieto, and N. Argade, 2012 “On Increasing Network Lifetime in Body Area Networks Using Global Routing with Energy Consumption Balancing,” Sensors, vol. 12, pp. 13088–13108.
[6]. G. Lo, S. Member, S. Gonz, and V. C. M. Leung, 2012 “Wireless Body Area Network Node Localization using Small- Scale Spatial Information,” IEEE J. Biomed., vol.1 pp 1-12.
[7]. D. Zhang, G. Li, K. Zheng, X. Ming, and Z. H. Pan,2014 “An energy-balanced routing method based on forward-aware factor for wireless sensor networks,” IEEE Trans. Ind. Informatics, vol. 10, pp. 766–773.
[8]. G. Subramanian, 2014 “Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine detection,” IEEE Trans. Netw., vol. 10, pp. 141–145.
[9]. J. Choi, 2012 “Secure Multipath Routing in Wireless Multihop Networks based on Erasure Channel Modeling,” in IEEE Wireless Advanced,vol.6 pp. 6–10.
[10]. C. S. Raghavendra, S. Lindsey, and S. Lindsey,2002 “PEGASIS : Power-Efficient Gathering in Sensor Information Systems Stephanie Lindsey,” in Aerospace Conferance Proceedings, vol.7.pp 1-6.
[11]. M. Quwaider and S. Biswas, 2012“Delay Tolerant Routing Protocol Modeling for Low Power Wearable Wireless Sensor Networks,” Netw. Protoc. Algorithms, vol. 4, pp. 15–34.
[12]. Xingcheng Liu, Xinren Gong and Yongzhao Zheng, (2014) “Reliable Cooperative Communications Based on Random Network Coding in Multi-Hop Relay”. IEEE Sensors Journal, (Volume:14 , Issue: 8 ), Page(s): 2514 - 2523. DOI:10.1109/JSEN.2014.2310899
Citation
Neha Gupta and Balraj S. Sidhu, "Cost Based Energy Efficient Routing Algorithm for Wireless Body Area Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-5, 2015.
Improving the performance of Mobile Wireless Sensor Networks using modified DBSCAN
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.6-10, Aug-2015
Abstract
In wireless sensor networks the nodes are most of times static in nature. But in Mobile wireless sensor networks the nodes are mobile in nature, in such kind of networks if the emphasis is given on the clustering then the cluster head sometimes tend to move out of the cluster. The paper analyzes ECBR-MWSN which takes into account mobility, remaining energy and distance to the base station while making selection for the cluster head nodes. The proposed work however has tried to reduce the time taken in rotation of cluster heads. The performance of network was analyzed using throughput, delay and packet delivery ratio which showed a significant improvement.
Key-Words / Index Term
ECBR-MWSN, Cluster head, Throughput of Network, delay, Packet Delivery Ratio, Routing Protocol, Sensor Nodes, Mobile Sink
References
[1] B. Nazir; H. Hasbullah, "Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network," International Conference on Computer Applications and Industrial Electronics (ICCAIE), pp.624-629, 5-8 Dec.2010.
[2] T. Rault, A. Bouabdallah, Y. Challal, "WSN lifetime optimization through controlled sink mobility and packet buffering," Global Information Infrastructure Symposium,pp.1-6, 28-31 Oct. 2013.
[3] Madhumathy, P.; Sivakumar, D., "Enabling energy efficient sensory data collection using multiple mobile sink," Communications, China, vol.11, no.10, pp.29-37, Oct. 2014.
[4] Mao Ye; Chengfa Li; Guihai Chen; Jie Wu, "EECS: An Energy Efficient Clustering Scheme in Wireless Sensor Networks," 24th IEEE International Performance, Computing, and Communications Conference, pp.535-540, 7-9 April 2005.
[5] A. Hosen, S. Kim and G. Cho, “An Energy efficient Cluster Formation and Maintenance Scheme for Wireless Sensor Networks”, Journal of Information and Communication Convergence Engineering, 2012.
[6] P. Dekate, “An Efficient Algorithm for Sink Mobility to Extend Lifetime of Homogeneous Wireless Sensor Networks”, International Journal of Current Engineering and Technology, vol. 4, no. 3,pp. 2277-4106, 2014.
[7] Tashtarian, F.; Moghaddam, M.H.Y.; Effati, S., "Energy efficient data gathering algorithm in hierarchical wireless sensor networks with mobile sink," 2nd International eConference on Computer and Knowledge Engineering (ICCKE), pp.232-237, 18-19 Oct. 2012.
[8] Palaskar, S.P.; Chavhan, N.A., "Design and Implementation of Energy Efficient Node Data Transmission by Using Mobile Sink Node," Fourth International Conference on Communication Systems and Network Technologies (CSNT), 2014 , vol., no., pp.79,82, 7-9 April 2014.
[9] R.U. Anitha, Dr. P Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor networks," Proceedings of 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) Feb 21-22, 2013
[10] Jiawei Han, Micheline Kamber, "Data Mining: Concepts and Techniques," Morgan Kaufmann Publishers, 2002.
Citation
Abhinav Gupta and Prabhdeep Singh, "Improving the performance of Mobile Wireless Sensor Networks using modified DBSCAN," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.6-10, 2015.
An Efficient Approach for Localization using Trilateration Algorithm based on Received Signal Strength in Wireless Sensor Network
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.11-16, Aug-2015
Abstract
In this work, an efficient approach without additional hardware and improved accuracy is proposed Trilateration based algorithm is a distributed beacon-based localization algorithm uses distance estimation to compute the 3-D position of nodes in a network with help of Received Signal Strength. The blind node can estimate its distance from anchor node using received signal strength and the position (x, y, z) in 3-D of the node can be computed from the position information obtained from the three and four anchor nodes using trilateration. Signal propagation model is used to find out the received power i.e. received signal strength from different sensor nodes. This method uses this received signal strength. This received signal strength information is used in the trilateration method to find out the exact location of the blind nodes in the sensor field. The average localization error is coming to be 0.0119 computed with 100 anchor nodes.
Key-Words / Index Term
Trilateration, RSS, Wireless Sensor Network
References
[1] Hongyang Chen, Pei Huang, Marcelo Martins, Hing Cheung So, and Kaoru Sezaki,” Novel Centroid Localization Algorithm for Three-Dimensional Wireless Sensor Networks”, IEEE, 2008.
[2] Chia-Yen Shih, Pedro Jos´e Marr´on,” COLA: Complexity-Reduced Trilateration Approach for 3D Localization in Wireless Sensor Networks”, 2010 IEEE Fourth International Conference on Sensor Technologies and Applications.
[3] Oguejiofor O.S, Aniedu, Ejiofor H.C, Okolibe A.U,”Trilateration based Localization Algorithm for Wireless Sensor Networks”, IJISME, 2013.
[4] Pratik S. Patel, Jignesh R. Patel,” Localization Algorithm for Mobile Sensor Nodes Using 3D Space in Wireless Sensor Network”, International Journal on Recent and Innovation Trends in Computing and Communication, 2014.
[5] Labyad Asmaa, kharraz Aroussi Hatim, Mouloudi Abdelaaziz,” Localization Algorithm Research in Wireless Sensor Networks Based on Multilateration and Trilateration Techniques”, IEEE, 2014.
[6] C.Y.Chony and S.P Kumar, 2003 “sensor networks. Evolution opportunities and challenges”, proceeding of the IEEE, VOL.91.
[7] J. Bachrach and C. Taylor,” Handbook of Sensor Networks: Algorithms and Architectures”, chapter Localization in Sensor Networks, Wiley, 2005.
[8] Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”, chapter Localization and positioning, Wiley, 2005.
[9] Aspnes,J., T. Eren, D.K. Goldenberg, A.S. Morse, W. Whiteley, Y.R. Yang, B.D. Anderson, and P.N. Belhumeur, “A theory of network localization”: IEEE Transactions on Mobile Computing: 2006,1663–1678.
[10] Yao-Hung Wu and Wei-Mei Chen,” An Intelligent Target Localization in Wireless Sensor Networks”, IEEE, 2014.
[11] Ian F.Akyildiz, Mehmet Can Vuran, “Wireless Sensor Networks”, Wiley, 2010.
[12] Amitangshu Pal,” Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges”, Network Protocols and Algorithms ISSN 1943-3581 2010, Vol. 2, No. 1.
[13] Nabil Ali Alrajeh, Maryam Bashir, Bilan shams, 2013.”Localization Techniques in Wireless Sensor Networks”, Hindawi Publishing Corporation, 2013.
[14] Zenon Chaczko, Ryszard Klempous, Jan Nikodem, Michal Nikodem, “Methods of Sensors Localization in Wireless Sensor Networks”, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ,2007.
[15] Vishal Garg, Mukul Jhamb,” A Review of Wireless Sensor Network on Localization Techniques”, International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013.
[16] Mostafa Arbabi Monfared,” Localization in Wireless Sensor Networks Based on Fuzzy Logic”, Institute of Graduate Studies and Research, 2012.
[17] Yuan Zhang, Wenwu Wu, Yuehui Chen,” A Range-Based Localization Algorithm for Wireless Sensor Networks”, Journal of Communications and Networks, vol. 7, no. 4, December 2005.
[18] Weerat Katekaew, Chakchai So-In, Kanokmon Rujirakul, Boonsup Waikham,” H-FCD: Hybrid Fuzzy Centroid and DV-Hop Localization Algorithm in Wireless Sensor Networks”, 2014 IEEE Fifth International Conference on Intelligent Systems, Modeling and Simulation.
[19] Baohui Zhang, Jin Fan, Guojun Dai, Tom H. Luan,” A Hybrid Localization Approach in 3D Wireless Sensor Network”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, 2015.
Citation
Niharika Singh Matharu and Avtar Singh Buttar, "An Efficient Approach for Localization using Trilateration Algorithm based on Received Signal Strength in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.11-16, 2015.
Reducing Handoff Blocking Probability in Wireless Cellular Networks- A Review
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.17-21, Aug-2015
Abstract
The continuity of service in an active cell is one of the most important issues in wireless cellular networks. Blocking occurs when a base station has no spare channel to allocate to a mobile user. It can be either new call blocking or handoff call blocking. In this paper, a review is given to better understand handoff blocking probability reducing models. These models prevent dropping of calls and improve quality of service.
Key-Words / Index Term
GSM, WCDMA, handoff, call dropping, handoff blocking probability, call blocking probability
References
[1] B. Jabbari and S.Tekinay, “Handover and Channel Assignment in Mobile Cellular Networks”, IEEE Communications Magazine, 30(11)1991, pp.42-46.
[2] A. A. Zeng, K. Mukumoto and A. Fukuda, “Performance Analysis of Mobile Cellular Radio System with Priority Reservation Handoff Procedure”, IEEE VTC-94, Vol. 3, 1994, pp. 1829-1833.
[3] Ahmed Abutaleb, Victor O. K. Li,"Location update optimization in personal communication systems", Wireless Networks, 3, pp. 205-216, 1997.
[4] R. Guerin, “Queuing Blocking System with Two Arrival Streams and Guard Channels”, IEEE Transactions on Communications, 1998, 36:153-163
[5] H. G. Ebersman and O. K Tonguz, “Handoff ordering using signal prediction priority queuing in personal communication system,” IEEE Trans. Veh. Technol., vol. 48, pp. 20–35, Jan. 1999.
[6] D. Staehle and A. Mäder, “An analytic approximation of the uplink capacity in a UMTS network with heterogeneous traffic,” Proc. 18th International Teletraffic Congress (ITC), Berlin, August 31 – September 5, 2003.
[7] R. Chang and S. Leu, “Handoff Ordering Using Signal Strength for Multimedia Communications in Wireless Networks:, IEEE Transactions On Wireless Communications, Vol. 3, No. 5, September 2004.
[8] A. Mäder and D. Staehle, “Analytic modeling of the WCDMA downlink capacity in multi-service environments,” Proc. 16th International Teletraffic Congress (ITC) Specialist Seminar, Antwerp, Belgium, August 31 – September 2, 2004.
[9] G. Kallos, V. Vassilakis, I. Moscholios, and M. Logothetis, “Performance modeling of W-CDMA networks supporting elastic and adaptive traffic,” Proc. Fourth International Working Conference on Performance Modeling and Evaluation of Heterogeneous Networks (HET-NETs 2006), Ilkley, U.K., Sept. 2006.
[10] V. Vassilakis, G. Kallos, I. Moscholios, and M. Logothetis, "The wireless Engset multi-rate loss model for the call-level analysis of WCDMA networks," Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007) Athens, Greece, Sept. 2007.
[11] V. Vassilakis and M. Logothetis, “The wireless Engset multirate loss model for the handoff traffic analysis in W-CDMA networks,” Proc. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), Cannes, France, August 31 – September 4, 2008.
[12] V. Vassilakis, G. Kallos, I. Moscholios, and M. Logothetis, "On the handoff-call blocking probability calculation in W-CDMA cellular networks," Proc. IARIA 4th Advanced International Conference on Telecommunications (AICT 2008), Athens, Greece, June 8-13, 2008.
[13] V. Vassilakis, G. Kallos, I. Moscholios, and M. Logothetis, “On call admission control in W-CDMA networks supporting handoff traffic,” Ubiquitous Computing and Communication Journal - Special issue on Communication Systems, Networks and Digital Signal Processing, January 2009.
[14] M. Stasiak, P. Zwierzykowski, and D. Parniewicz, “Modelling of the WCDMA interface in the UMTS network with soft handoff mechanism,” Proc. IEEE Global Communications Conference, (GLOBECOM 2009), Honolulu, Hawaii, USA, 2009.
[15] Goswami V.,” A MAHO based prioritized handoff queuing scheme in cellular networks”, IEEE Advanced Computing (ICoAC), Dec. 2011.
[16] V. Goswami and P. K. Swain, “Analytical modeling for handling poor signal quality calls in cellular network,” International Journal of Networks and Communications 2012, 2(4): 47-54, 2012.
[17] S. Malathy, T. Ravichandran,” Reducing Handoff Failures in Cellular Network by Predicting Its Future Move”, IJCST Vol. 3, Issue 2, April - June 2012.
[18] Seema P. Mahalungkar, Santosh S. Sambare “Survey of Call Blocking Probability Reducing Techniques in Cellular Network”, IJSRP, Volume 2, Issue 12, December 2012 1 ISSN 2250-3153.
[19] Seema P. Mahalungkar, Santosh S. Sambare “Improved Call Blocking Probability Reducing Technique Using Auxiliary Stations” IJSER, Volume 4, Issue3, March-2013 1ISSN 2229-5518odd page.
[20] Aniebiet Kingsley Inyang, Engr. (Dr.) F. K. Opara, Uduak Idio Akpan,” Development of Efficient Handoff Queuing Scheme for Minimizing Call Drop Due to Handoff failure in GSM Systems”, International Journal of Engineering Research & Technology (IJERT) , Vol. 3 Issue 4, April – 2014.
[21] Vassilios G. Vassilakis, Ioannis D. Moscholios, Michael D. Logothetis, Michael N. Koukias,” A Single-Threshold Model for Handoff Traffic Analysis in Cellular CDMA Networks”, AICT2014.
[22] Vinay Prakash Srivastava, Jalneesh Singh, Vinay Kumar Verma,” Decreasing Call Blocking Rate by Using Optimization Technique”, International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014.
[23] Harpreet Kaur, Amrit Kaur,” Various Handover Management Techniques in GSM Cellular System,” International Journal For Technological Research In Engineering Volume 1, Issue 11, July-2014.
[24] Edem E. Williams and Daniel E. Asuquo,” An Efficient Model For Reducing Soft Blocking Probability In Wireless Cellular Networks”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 4, August 2014.
[25] Ashraf T. Almugheid, Sufian Yousef, Sattar Aboud,” Performance Evaluation of Quality Metrics for Single and Multi Cell Admission Control with Heterogeneous Traffic in WCDMA Networks”, International Journal of Engineering and Technology Volume 4 No. 1,2014.
Citation
Ambreen Fatma Siddiqui, Pankaj Kumar and Raj Gaurang Tiwari, "Reducing Handoff Blocking Probability in Wireless Cellular Networks- A Review," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.17-21, 2015.
Review of Different Criteria For Designing Routing Protocols
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.22-25, Aug-2015
Abstract
Routing is the process of finding optimal path between source and destination. Because of the fact that packet may be necessary to hop or several hops before a packet reach the target, a routing protocol is needed. Routing protocols allow routers to dynamically advertise and discover routes, decide which routes are available and which are the most efficient routes to a target. In this paper we review different existing protocols and their applicability in current scenario.
Key-Words / Index Term
MANET, Routing, Performance, Qualitative, Quantitative Characteristics
References
[1]. Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh “Performance Evaluation Of Routing Protocols In Wireless Sensor Networks” International Journal of Computer Science and Information Technology, Volume 2, Number 2, April 2010
[2]. Jamal N. Al- Karaki, Ahmed E. kamal,”Routing Techniques In Wireless Sensor Networks:A Survey”,IEEE Wireless Communications December 2004.
[3]. Smt. Rajashree.V. Biradar & Prof V. C. Patil, “Classification and Comparison of routing Techniques in Wireless Ad-hoc Networks”, Proceedings of international Symposium on Ad-hoc Ubiquitous Computing (ISHUC’06), pages 7-11, 2006.
[4]. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 2(3): pages 28-39, May/June 2004.
[5]. P. Gupta and P. Kumar, “The capacity of wireless networks”, IEEE Transactions on Information Theory, 46(2): pages 388-394, March 2000.
[6]. G. S. Lauer, “Packet-radio Routing in Communications Networks”, (Ed. M. teenstrup), pages 313–350, 2004.
[7]. Bokureche, “Performance evaluation of routing protocols for ad hoc wireless networks”, ACM Mobile networks application, vol.9, no.4, pages 333-342, august- 2004.
[8]. L. Schwiebert, S. K. S. Gupta, and J. Weinmann, “Reserach challenges in wireless networks of biomedical sensors”, Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MobiCom ’01), pages 151-165, Rome, Italy, July 2001.
[9]. M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad Hoc Networks”, Proceedings of the ACM MobiHoc, pages 3-10, 2000.
[10]. Nasipuri, R. Castaneda, and S. R. Das, “Performance of multipath routing for on-demand protocols in mobile ad hoc networks”, Mobile Networks and Applications, vol. 6, pages 339-349, 2001.
Citation
Suman Saroj, Raj Gaurang Tiwari and Pankaj Kumar, "Review of Different Criteria For Designing Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.22-25, 2015.
A Review of Improvement on LEACH Protocol in Wireless Sensor Network
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.26-31, Aug-2015
Abstract
Wireless sensor network is a network that is composed of number of non rechargeable or non replaceable sensor nodes due to its limited battery power. In WSN routing techniques energy consumption is one of the most important issue to be considered. Hierarchical routing protocols are the best known protocols to minimize the energy consumption. LEACH protocol is one the cluster based hierarchical routing protocol. LEACH increases the network lifetime by consuming small percentage of total energy dissipated in network. This paper reviews on the LEACH protocol and its descendents.
Key-Words / Index Term
LEACH, Clusterhead, Cluster Selection, energy consumption, lifetime
References
[1]Vivek Katiyar Narottam Chand Surender Soni ”Improving Lifetime of Large-scale Wireless Sensor Networks through Heterogeneity” ICETECT 2011
[2]W.Heinzelman, A.Chandrakasan, and H.Balakrishnan, ”Energy-efficient Routing Protocols for Wireless Microsensor Networks,” in Proc. 33rd Hawaii Int. Conf. SystemSciences (HICSS), Maui, HI, Jan.2000.
[3]J.Gnanambigai, Dr.N.Rengarajan, and K.Anbukkarasi, ”Leach and Its Descendant Protocols: A Survey,” International Journal of Communication and Computer Technologies (IJCCT), vol. 01, issue 02, no.3, pp. 15-21, September 2012.
[4] Jia Xu,Ning Jin, Xizhong Lou,Ting Peng,Qian Zhou,Yanmin Chen“Improvement of LEACH protocol for WSN” IEEE, 2012.
[5] Jamal, N.; E. Kamal, A.-K.A. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun. 2004, 11, 6-28.
[6] Arezoo Yektaparast, Fatemeh-Hoda Nabavi, Adel Sarmast “ An Improvement on LEACH Protocol (Cell-LEACH) ”
[7] P. Manimala1, R. Senthamil selvi2, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250–2459, ISO 9001:2008 Certified Journal, Vol. 3, Issue 12, December 2013).
8] M. Aslam1, N. Javaid2, A. Rahim3, U. Nazir4, “Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless Sensor Networks” [cs.NI] 11 July 2012.
[9]Heena Dhawan, Sandeep Waraich,“ A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey” International Journal of Computer Applications (0975 – 8887) Volume 95– No.8, June 2014.
[10] Parul Bakaraniya, Sheetal Mehta, “K-LEACH: An improved LEACH Protocol for Lifetime Improvement in WSN” International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 ISSN: 2231-5381 http://www.ijettjournal.org Page 1521
[11]Pallavi Zambare, ShitalDabhade, ” Improved Ex-LEACH Protocol based on Energy Efficient Clustering Approach” International Journal of Computer Applications (0975 – 8887) Volume 67– No.24, April 2013.
[12] Ravneet Kaur, Deepika Sharma and Navdeep Kaur, “Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network” International Journal of P2P Network Trends and Technology- Volume3Issue1- 2013.
[13]Tripti Agrawal, Rajendra Singh Kushwah, “ A Survey on Leach and its Enhanced Protocols in WSN” International Journal of Computer Applications® (IJCA) (0975 – 8887) National Seminar on Recent Advances in Wireless Networks and Communications, NWNC-2014.
[14] Divya Prabha and Vishal Kumar Arora, ” A Survey on LEACH and its Descendant Protocols in Wireless Sensor Network” International Conference on Communication, Computing & Systems (ICCCS–2014).
[15] I. F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, \Wireless sensor networks: a survey," Computer Networks, Vol.38, pp. 393{422, March 2002.
Citation
Uruj Fatma Siddiqui, Raj Gaurang Tiwari and Pankaj Kumar, "A Review of Improvement on LEACH Protocol in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.26-31, 2015.
Detection of DDoS Attack Using UCLA Dataset on Different Classifiers
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.33-36, Aug-2015
Abstract
Distributed denial of service attack have strong Impact on security of internet because these attacks affects the normal functioning causing loss of billions of dollars. DDoS is very harmful to network as it delays the legitimate users from excessing the server. However these networks were well equipped in security yet they were damaged by DDoS attack. In this paper, the proposed system presents both detecting and classifying schemes of DDoS attack using K-NN, SVM and Naïve Bayesian. The algorithms are developed by using various features of attack packets. By studying the incoming and outgoing network traffic and different classifiers are used to analyze these features. The main objective of this paper is to study classifiers on one dataset for DDoS attack.
Key-Words / Index Term
DDoS attack, Internet Securities, Attack Packet
References
[1]. H. F. Lipson, “Tracking and Tracing” Cyber Attacks: Technical Challenges and Global Policy Issues”, CERT Coordination Centre, Special Report: CMU/SEI-2002-SR-009, 2002
[2]. N. Stephen and N. Judy, Network Intrusion Detection, 3nd ed., New Riders Publishing, United States of America, 2002.
[3]. A. D. Basheer Nayef, “Mitigation and traceback countermeasures for DDoS attacks”, Iowa State University, 2005. .
[4]. Chen, Y. Hwang, K., W. S. Ku, “Distributed change-point detection of DDoS attacks over multiple network domains.” Proceedings of the IEEE International Symposium on Collaborative Technologies and Systems, Las Vegas, NV, 14-17 May. IEEE CS, 2006, pp. 543–550.
[5]. L. Limwiwatkul, A. Rungsawang, “ Distributed denial of service detection using TCP/IP header and traffic measurement analysis”, Proceedings of the IEEE International Symposium Communications and Information Technology, Sapporo, Japan, 26-29 October, IEEE CS, 2006, , pp. 605–610.
[6]. Lee, Juhyun Kim, Ki Hoon Kwon, Younggoo Han, Sehun Kim, “DDoS attack detection method using Cluster analysis”, Expert System with Applications 34, 2008, pp.1659-1665.
[7]. K. Reyhaneh, F. Ahmad, “An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks”, International Conference on Network and Electronics Engineering IPCST vol.11, 2011, IACSIT Press, Singapore.
[8]. Cristóbal Romero, Sebastián Ventura, Pedro G. Espejo and César Hervás,” Data Mining Algorithms to Classify Students”.
[9]. UCLA CSD packet traces. http://www.lasr.cs.ucla.edu/ddos/traces/public/usc.
[10]. N. Abirami, T. Kamalakannan and Dr. A. Muthukumaravel ,” A Study on Analysis of Various Data mining Classification Techniques on Healthcare Data” International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 7, July 2013,pp.604-607.
[11]. K. Wisaeng,”A Comparison of Different Classification Techniques for Bank Direct Marketing”, International Journal of Soft Computing and Engineering, Volume-3, Issue-4, September 2013, pp. 116-119.
[12]. S. Archana and Dr. K. Elangovan, “Survey of Classification Techniques in Data Mining”, International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 2, February-2014, pg. 65-71.
Citation
Aakriti Aggarwal and Ankur Gupta, "Detection of DDoS Attack Using UCLA Dataset on Different Classifiers," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.33-36, 2015.
A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network
Review Paper | Journal Paper
Vol.3 , Issue.8 , pp.37-45, Aug-2015
Abstract
Data aggregation process plays a key function in wireless sensor networks. The overall aim of data aggregation techniques is to assemble and combine information in an energy efficient way so that the lifetime of the network can be increased. In order to increase the energy efficiency and network lifetime, many researchers have proposed in data aggregation in wireless sensor networks since 1993.This research points to systematic study of subjects and challenges in data collection in wireless sensor networks. Data aggregation areas from six aspects: type of data aggregation techniques, secure data, privacy preserving data, cluster based data, energy efficient data and maximum lifetime of data aggregation. We accomplished a systematic literature review of data aggregation in wireless sensor networks in last two decades (1993-2015).we have identified 42 primary studies relevant to the aim of this research. After investigating this study, we found that six aggregation approach in wireless sensor networks. Data collection has various algorithms on the basis of performance criteria. Data collection techniques are promising in the area of wireless sensor networks. In this paper, we study cluster based data aggregation techniques approaches in networks and describe the various approaches in hierarchical networks protocols.
Key-Words / Index Term
Data Aggregation, Wireless Sensor Networks, Clustering, Sensor Nodes
References
[1] F. Q, Z. F and G. L, "Lightweight sensing and communication protocols for target enumeration and aggregation," Mobile Hoc Networks, 2003.
[2] X. N, R. S, C. K. K, G. D, B. A, G. R and E. D, " A wireless sensor network for structural monitoring," in ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004.
[3] S. R, M. A, P. J and C. D, "An analysis of a large scale habitat monitoring application.," in ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004.
[4] H. A, KOHLER, M and D. P, "Seismic amplitude variations due to site and basin edge effects in the Los Angeles Basin," Transcation American Geophysical Union, 2003.
[5] S. Yoon and C. Shahabi, "The Clustered AGgregation (CAG) Technique Leveraging Spatial and Temporal Correlations in Wireless Sensor Networks," ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 3, March 2007.
[6] M. Demirbas and H. Ferhatosmanoglu, "Peer-to-peer spatial queries in sensor networks," in Proceedings. Third International Conference on P2P, 2003.
[7] H. Alzaid, E. Foo and J. G. Nieto, "Secure Data Aggregation in Wireless Sensor Network: a survey," Proc. 6th Australasian Information Security Conference , 2008.
[8] Rajagopalan, Ramesh, Varshney and P. k, "Data aggregation techniques in sensor networks: A survey," IEEE communication survey & tutorial, 2006.
[9] D. Kumar, T. Aseri and R. Patel, "EECDA: Energy Efficient Clustering and Data Aggregation Protocol for Heterogeneous Wireless Sensor Networks," International Journal of Computers, Communications & Control, vol. 6, no. 1, March 2011, pp. 113-124.
[10] H. O. Tan and I. Korpeoglu, "Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks," SIGMOD Record, vol. 32, no. 4, December 2003, pp. 66-71.
[11] J. Zheng and A. Jamalipour, Wireless sensor networks : a networking perspective, 2009, pp. 215-250.
[12] S. Lindsey, C. Raghavendra and K. M. Sivalingam, "Data Gathering Algorithms in Sensor Networks Using Energy Metrics," IEEE Transcation Parallel and Distributed Systems, vol. 13, no. 9, september 2002, pp. 924-35.
[13] N. Tabassum, Q. E. K. M. Mamun and Y. Urano, "COSEN: A chain oriented sensor network for efficient data collection," in Proc. ITNG, 2006.
[14] K.-H. Chen, J.-M. Huang and C.-. C. Hsiao, "CHIRON: An Energy-Efficient Chain-Based Hierarchical Routing Protocol in Wireless Sensor Networks," IEEE, 2009.
[15] A. Tripathi, S. Gupta and B. Chourasiya, "Survey on data aggregation techniques for wireless sensor networks," IJARCCE, vol. 3, no. 7, July 2014.
[16] J. Wen, S. Li, Z. Lin, Y. Hu and C. Huang, "Systematic literature review of machine learning based software development effort estimation models," ELSEVIER, 2012, pp. 41-59.
[17] F. Hu and X. Cao, Wireless sensor networks principles and practice, 1 ed., vol. 1, Auerbach, 2010, pp. 249-252.
[18] P. patil and U. Kulkarni, "Analysis of data aggregation techniques in wireless sensor networks," IJCEM, vol. 16, no. 1, January 2013.
[19] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient communication protocol for wireless micro sensor networks," in Proceedings the 33rd Annivesery Hawaii International Conference, 2000.
[20] W. R. Heinzelman, "Application-Specific Protocol Architectures for Wireless Networks," , 2000.
[21] J. Shin and C. Suh, "CREEC: Chain Routing with Even Energy Consumption," IEEE Communications and Networks, 2011, pp. 17-25.
[22] S. Kumar, M. Prateek, N. Ahuja and B. Bhushan, "MEECDA: Multihop Energy Efficient Clustering and Data Aggregation Protocol for HWSN," International Journal of Computer Applications, vol. 88, no. 9, February 2014.
[23] A. MANJESHWAR and D. AGRAWAL, "TEEN: A Routing protocol for enhanced efficiency in wireless sensor networks," International Workshop on Parallel and Distributed Computing, vol. 1, April 2001, pp. 2009-2015.
[24] A. MANJESHWAR and D. AGRAWAL, "APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks," International Workshop on Parallel and Distributed Computing, 2002.
[25] K. Dasgupta, "Maximum lifetime data gathering and aggregation in Wireless sensor network," in IEEE Networks'02 conference, 2002.
[26] S. Madden, M. J. Franklin, J. Hellerstein and W. Hong, "TAG: A Tiny AGgregation Service for ad hoc Sensor Networks," Proceedings of the Fifth Symposium on Operating Systems Design and implementation (OSDI 02), December 2002.
[27] S. Chatterjea and P. Havinga, "A Dynamic Data Aggregation Scheme For Wireless Sensor Networks," Proccedings Program for Research on Integrated Systems and Circuits, November 2003.
[28] J. Gehrke and Y. Yao, "The Cougar Approach to In-Network Query Processing in Sensor Networks," SIGMOD, 2002.
[29] O. Younis and S. Fahmy, "HEED: a Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor networks," IEEE Trans. Mobile Computing, vol. 3, no. 4, December 2004, pp. 366-379.
[30] S. YOON and C.SHAHABI, "Exploiting spatial correlation towards an energy efficient Clustered AGgregation technique (CAG)," in IEEE International Conference on Communications, 2005.
[31] A. WOO, S. MADDEN and R. GOVINDAN, "Networking support for query processing in sensor networks," Communication ACM (CACM), 2004.
[32] c.-M. Liu and C.-H. Lee, "Distributed algorithmfor energy-efficient cluster head election in wireless mobile sensor networks," in ICWN, Nevada, USA, 2005.
[33] C.-M. liu, C.-H. lee and l.-c. Wang, "Power efficient communication algorithms for wireless mobile sensor networks," in ACM PEWASUN, Venice, Italy, 2004.
[34] S. D. MURUGANATHAN, D. C. F. MA, R. I. BHASIN and A. O. FAPOJUWO, "A centralized energy-efficient routing protocol for wireless sensor networks," IEEE Communication Society, vol. 43, no. 3, 14 March 2005, pp. 8-13.
[35] S. Hussain and A. W. Matin, "Hierarchical Cluster-based Routing in Wireless Sensor Network," in 5th International Conference on Information Processing in Sensor Network IPSN06, USA, 2006.
[36] S. Banerjee and S. Khuller, "A clustering scheme for hierarchical control in multi-hop wireless sensor networks," in IEEE INFOCOM, Anchorage, Alaska, USA, 2001.
[37] F. Xiang and S. Yulin, "Improvement on LEACH protocol of wireless sensor network," in International conference on sensor technologies and applications, 2007.
[38] H. Zhou, "Study and design on cluster routing protocols of wireless sensor networks," 2006.
[39] U. Sajjanhar and P. Mitra, "A clustering scheme for hierarchical control in multi-hop wireless sensor networks," in International Conference on Mobile Data Managment MDM07, 2007.
[40] P. Bhuvaneswari, V. V and S. S, "SPEAR: sensor protocol for energy aware routing in wireless senor network," in IEEE third International Conference on Wireless communication and sensor network WCSN, Allahabad, 2007.
[41] A. S. Zahmati, B. Abolhassani, A. A. B. Shirazi and A. S. Bakhtaran, "An Energy efficient protocol with static clustering for wireless sensor networks," intenational journal on electronics, circuits and system, vol. 1, no. 2, 2008, pp. 135-138.
[42] A.-K. J.N and K. A.E, "Routing techniques in wireless sensor networks : A Survey," 2004.
Citation
Obulapu Hiteshreddy, Pardeep Singh and Siddharth Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.37-45, 2015.
Performance Evaluation of FCFS and EBF in Linear and Non-Linear Gridlet Size
Research Paper | Journal Paper
Vol.3 , Issue.8 , pp.46-49, Aug-2015
Abstract
Abstract— Grid computing define as the infrastructure in which hardware as well as software resources situated at different places; shared and uses by the different organizations which coordinated to provide consistent, pervasive and transparent access. Workflow is a set of task or subtasks having dependency among them. Resource allocation is one the objective of grid computing. Efficiently use of resources to run the workflow tasks in order to achieve maximum utilization of resources. Throughput is amount of information process in given amount of time. This parameter is mainly applied to various phenomenon’s of networking systems. In this paper, first come first serve and easy backfilling algorithm performance evaluated on the basis of linear and non-linear increase in gridlet size and compare the result in both the cases. The results indicate that EBF has better resource utilization and throughput than FCFS.
Key-Words / Index Term
Grid Computing; Workflow; Resource Utilization; Throughput
References
[1] D. B. Skillicorn, “Motivating Computational Grids”, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, Page No (401–406), May 2002.
[2] F. Xhafa and A. Abraham, "Meta-Heuristics for Grid Scheduling Problems", Metaheuristics for Scheduling in Distributed Computing Environments, Springer-Verlag Berlin Heidelberg, Page No (1-37), 2008.
[3] A. Chakrabarti, “Grid Computing Security”, Springer-Verlag Berlin Heidelberg, 2007.
[4] I. Foster, “The physiology of the grid. Grid computing: making the global infrastructure a reality”, Page No (217–250), 2003.
[5] E. Elmroth and J. Tordsson, “Grid resource brokering algorithms enabling advance reservations and resource selection based on performance predictions”, Future Generation Computer Systems, Volume-24, Issue-6, Page No (585-593), 2008.
[6] I. Foster, C. Kesselman and S. Tuecke, “The anatomy of the grid: Enabling scalable virtual organizations”, International Journal of High Performance Computing Applications, Volume-15, Issue-3,Page No (200-222), 2001.
[7] N. Malarvizhi and V. R. Uthariaraj, “A Broker-Based Approach to Resource Discovery and Selection in Grid Environments”, International Conference on Computer and Electrical Engineering, 2008.
[8] B. Schnizler, “Resource Allocation in the Grid: A Market Engineering Approach”, Univ.-Verl. Karlsruhe, 2007.
[9] Ismail and Leila, "Dynamic Resource Allocation Mechanisms for Grid Computing Environment", 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, Page No (1-5), 2007.
[10] K. Srikala, and S. Ramachandram, "Pre-emptive Resource Allocation in Grid Computing (PRAG)", IEEE Confernce on Information & Communication Technologies, Page No (240-243), 2013.
[11] Krawczyk, Stefan, and K. Bubendorfer, "Grid Resource Allocation: Allocation Mechanisms and Utilisation Patterns", Proceedings of the sixth Australasian workshop on Grid computing and e-research,Volume- 82, Page No (73-81), 2008.
[12] J.C Patni, P. Rastogi, V.K Jayant, M.S. Aswal, “Methods and mechanisms of security in Grid Computing”, 2nd IEEE International Conference on Computing for Sustainable Global Development, Page No (1040-1043), 2015.
Citation
Neha Bhardwaj, Karambir and Ajay Jangra, "Performance Evaluation of FCFS and EBF in Linear and Non-Linear Gridlet Size," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.46-49, 2015.
A Survey on Various Online Transaction, E-Commerce Security and Applications
Survey Paper | Journal Paper
Vol.3 , Issue.8 , pp.50-55, Aug-2015
Abstract
While the usage of ecommerce application, information and communication technology enhances in private and professional existence, personal data is extensively stored. While service providers require relying on recognizing their consumers, aware characteristics administration and privacy increases into a new assessment for the service user, particularly in the electronic service circumstance. At this time, recent technology infrastructures can support in on condition that security to both sides by assuring identification and privacy at the same time.
Key-Words / Index Term
Trusted Platform Module,Trusted Computing Group,Security,Security
References
[1] Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification).
[2] Brickell, E. F., Camenisch, J., and Chen, L. Direct Anonymous Attestation. In 11th ACM Conference on Computer and Communications Security (CCS 2004) (2004), V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds., ACM, pp. 132–145.
[3] Camenisch, J. Better Privacy for Trusted Computing Platforms: (Extended Abstract). In 9th European Symposium on Research In Computer Security (ESORICS 2004) (2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., vol. 3193 of Lecture Notes in Computer Science, Springer, pp. 73–88.
[4] Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium (2004), USENIX, pp. 223–238.
[5] A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In Proceedings of ACM SIGCOMM, 2002.
[6] TCG (2008) TPM Spezifikationen der Trusted Computing Group [Specifications of the Trusted Computing Group], https://www.trustedcomputinggroup.org/specs/TPM,.
[7] European Multilaterally Secure Computing Base (EMSCB) (2008) Turaja Technology, http://www.emscb.de/content/pages/About-Turaya-de.htm,.
[8] ARM (2008) ARM processor architecture, security extension ARM Trust Zone technology, http://www.arm.com/products/esd/trustzone_home.html, .
[9] Rankl, W.; Effing, W. (2002) Handbuch der Chipkarten, 4th edition, Munich, Carl Hanser Verlag.
[10] Swoboda, J., Spitz, S., Pramateftakis, M. (2008) Kryptographie und IT Sicherheit, Wiesbaden, Vieweg-Teubner, ISBN 978-3-8348-0248-4.
[11] InspireD (2005) D6 Communication Architecture Definition (Draft), forthcoming on http://www.inspiredproject.com,.
[12] Trusted Computing Group. http://www.trustedcomputinggroup.org/ (05 April 2010).
[13] Ekberg, J.-E., and Kylänpää, M. Mobile Trusted Module (MTM) – an introduction, Nov. 2007. http://research.nokia.com/files/NRCTR2007015.pdf.
[14] D. Challener, K. Yoder, F. Catherman, D. Saord, and L. V. Coorn. A Practical Guide to Trusted Computing. Pearson plc IBM press, 2008. ISBN-13: 978-0-13-239842-8.
[15] http://www.ecommerce-digest.com/7_8.html. (Accessed 23 Sept 2013).
[16] Christoph Kern, Anita Kesavan, and NeilDaswani, Foundations of Security: What Every Programmer Needs to Know.
[17] Raghav Gautam, Sukhwinder Singh, “Network Security Issues in e-Commerce” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[18] Ashish Kr. Luhach, Dr. Sanjay K. Dwivedi, Dr. C. K. Jha. “Designing A Logical Security Framework For E-Commerce System Based On SOA” International Journal on Soft Computing (IJSC) Vol. 5, No. 2, May 2014.
[19] Khandare Nikhil B., “Transaction Security for Internet E-commerce Application” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
[20] Ankur Chaudhary, Khaleel Ahmad, M.A. Rizvi, “E-commerce Security Through Asymmetric Key Algorithm” Fourth International Conference on Communication Systems and Network Technologies, 2014.
[21] Thembekile O. Mayayise, Isaac O. Osunmakinde, “A Compliant Assurance Model for Assessing the Trustworthiness of Cloud-based E-Commerce Systems” 2014.
[22] Luca Mazzola, Aris Tsois, Tatyana Dimitrova, and Elena Camossi, “Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification” European Intelligence and Security Informatics Conference, 2013.
Citation
Varsha jotwani and Amit Dutta, "A Survey on Various Online Transaction, E-Commerce Security and Applications," International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.50-55, 2015.