Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: The lifetime of a wireless sensor network can be
effectively increased by using scheduling operations. Once the
sensors are randomly deployed, the task at hand is to find the largest
number of disjoint sets of sensors such that every sensor set provides
complete coverage of the target area. At any instant, only one of these
disjoint sets is switched on, while all other are switched off. This
paper proposes a heuristic search method to find the maximum
number of disjoint sets that completely cover the region. A
population of randomly initialized members is made to explore the
solution space. A set of heuristics has been applied to guide the
members to a possible solution in their neighborhood. The heuristics
escalate the convergence of the algorithm. The best solution explored
by the population is recorded and is continuously updated. The
proposed algorithm has been tested for applications which require
sensing of multiple target points, referred to as point coverage
applications. Results show that the proposed algorithm outclasses the
existing algorithms. It always finds the optimum solution, and that
too by making fewer number of fitness function evaluations than the
existing approaches.
Abstract: An Acoustic Micro-Energy Harvester (AMEH) is
developed to convert wasted acoustical energy into useful electrical
energy. AMEH is mathematically modeled using Lumped Element
Modelling (LEM) and Euler-Bernoulli beam (EBB) modelling. An
experiment is designed to validate the mathematical model and assess
the feasibility of AMEH. Comparison of theoretical and experimental
data on critical parameter value such as Mm, Cms, dm and Ceb showed
the variances are within 1% to 6%, which is reasonably acceptable.
Then, AMEH undergoes bandwidth tuning for performance
optimization. The AMEH successfully produces 0.9V/(m/s^2) and
1.79μW/(m^2/s^4) at 60Hz and 400kΩ resistive load which only
show variances about 7% compared to theoretical data. At 1g and
60Hz resonance frequency, the averaged power output is about
2.2mW which fulfilled a range of wireless sensors and
communication peripherals power requirements. Finally, the design
for AMEH is assessed, validated and deemed as a feasible design.
Abstract: Construction projects are information intensive in
nature and involve many activities that are related to each other.
Wireless technologies can be used to improve the accuracy and
timeliness of data collected from construction sites and shares it with
appropriate parties. Nonetheless, the construction industry tends to be
conservative and shows hesitation to adopt new technologies. A main
concern for owners, contractors or any person in charge on a job site
is the cost of the technology in question. Wireless technologies are
not cheap. There are a lot of expenses to be taken into consideration,
and a study should be completed to make sure that the importance
and savings resulting from the usage of this technology is worth the
expenses. This research attempts to assess the effectiveness of using
the appropriate wireless technologies based on criteria such as
performance, reliability, and risk. The assessment is based on a utility
function model that breaks down the selection issue into alternatives
attribute. Then the attributes are assigned weights and single
attributes are measured. Finally, single attribute are combined to
develop one single aggregate utility index for each alternative.
Abstract: This paper presents Carrier Sense Multiple Access
(CSMA) communication models based on SoC design methodology.
Such a model can be used to support the modeling of the complex
wireless communication systems. Therefore, the use of such
communication model is an important technique in the construction
of high-performance communication. SystemC has been chosen
because it provides a homogeneous design flow for complex designs
(i.e. SoC and IP-based design). We use a swarm system to validate
CSMA designed model and to show how advantages of incorporating
communication early in the design process. The wireless
communication created through the modeling of CSMA protocol that
can be used to achieve communication between all the agents and to
coordinate access to the shared medium (channel).
Abstract: In recent years, multi-antenna techniques are being considered as a potential solution to increase the flow of future wireless communication systems. The objective of this article is to study the emission and reception system MIMO (Multiple Input Multiple Output), and present the different reception decoding techniques. First we will present the least complex technical, linear receivers such as the zero forcing equalizer (ZF) and minimum mean squared error (MMSE). Then a nonlinear technique called ordered successive cancellation of interferences (OSIC) and the optimal detector based on the maximum likelihood criterion (ML), finally, we simulate the associated decoding algorithms for MIMO system such as ZF, MMSE, OSIC and ML, thus a comparison of performance of these algorithms in MIMO context.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: A sensory network consists of multiple detection
locations called sensor nodes, each of which is tiny, featherweight
and portable. A single path routing protocols in wireless sensor
network can lead to holes in the network, since only the nodes
present in the single path is used for the data transmission. Apart
from the advantages like reduced computation, complexity and
resource utilization, there are some drawbacks like throughput,
increased traffic load and delay in data delivery. Therefore, multipath
routing protocols are preferred for WSN. Distributing the traffic
among multiple paths increases the network lifetime. We propose a
scheme, for the data to be transmitted through a dominant path to
save energy. In order to obtain a high delivery ratio, a basic route
reconstruction protocol is utilized to reconstruct the path whenever a
failure is detected. A basic reconstruction routing (BRR) algorithm is
proposed, in which a node can leap over path failure by using the
already existing routing information from its neighbourhood while
the composed data is transmitted from the source to the sink. In order
to save the energy and attain high data delivery ratio, data is
transmitted along a multiple path, which is achieved by BRR
algorithm whenever a failure is detected. Further, the analysis of
how the proposed protocol overcomes the drawback of the existing
protocols is presented. The performance of our protocol is compared
to AOMDV and energy efficient node-disjoint multipath routing
protocol (EENDMRP). The system is implemented using NS-2.34.
The simulation results show that the proposed protocol has high
delivery ratio with low energy consumption.
Abstract: This paper introduces a video sharing platform based
on WiFi, which consists of camera, mobile phone and PC server. This
platform can receive wireless signal from the camera and show the live
video on the mobile phone captured by camera. In addition, it is able to
send commands to camera and control the camera’s holder to rotate.
The platform can be applied to interactive teaching and dangerous
area’s monitoring and so on. Testing results show that the platform can
share the live video of mobile phone. Furthermore, if the system’s PC
server and the camera and many mobile phones are connected
together, it can transfer photos concurrently.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: The 5th generation of mobile networks is term used in
various research papers and projects to identify the next major phase
of mobile telecommunications standards. 5G wireless networks will
support higher peak data rate, lower latency and provide best
connections with QoS guarantees.
In this article, we discuss various promising technologies for 5G
wireless communication systems, such as IPv6 support, World Wide
Wireless Web (WWWW), Dynamic Adhoc Wireless Networks
(DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud
Computing, cognitive radio technology and FBMC/OQAM.
This paper is organized as follows: First, we will give introduction
to 5G systems, present some goals and requirements of 5G. In the
next, basic differences between 4G and 5G are given, after we talk
about key technology innovations of 5G systems and finally we will
conclude in last Section.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: The Orthogonal Frequency Division Multiplexing
(OFDM) with high data rate, high spectral efficiency and its ability to
mitigate the effects of multipath makes them most suitable in wireless
application. Impulsive noise distorts the OFDM transmission and
therefore methods must be investigated to suppress this noise. In this
paper, a State Space Recursive Least Square (SSRLS) algorithm
based adaptive impulsive noise suppressor for OFDM
communication system is proposed. And a comparison with another
adaptive algorithm is conducted. The state space model-dependent
recursive parameters of proposed scheme enables to achieve steady
state mean squared error (MSE), low bit error rate (BER), and faster
convergence than that of some of existing algorithm.
Abstract: In this paper, we propose a system for preventing gas
risks through the use of wireless communication modules and
intelligent gas safety appliances. Our system configuration consists of
an automatic extinguishing system, detectors, a wall-pad, and a
microcomputer controlled micom gas meter to monitor gas flow and
pressure as well as the occurrence of earthquakes. The automatic fire
extinguishing system checks for both combustible gaseous leaks and
monitors the environmental temperature, while the detector array
measures smoke and CO gas concentrations. Depending on detected
conditions, the micom gas meter cuts off an inner valve and generates
a warning, the automatic fire-extinguishing system cuts off an external
valve and sprays extinguishing materials, or the sensors generate
signals and take further action when smoke or CO are detected.
Information on intelligent measures taken by the gas safety appliances
and sensors are transmitted to the wall-pad, which in turn relays this as
real time data to a server that can be monitored via an external network
(BcN) connection to a web or mobile application for the management
of gas safety. To validate this smart-home gas management system, we
field-tested its suitability for use in Korean apartments under several
scenarios.
Abstract: In this research article of modeling Underwater
Wireless Sensor Network Simulators, we provide a comprehensive
overview of the various currently available simulators used in UWSN
modeling. In this work, we compare their working environment,
software platform, simulation language, key features, limitations and
corresponding applications. Based on extensive experimentation and
performance analysis, we provide their efficiency for specific
applications. We have also provided guidelines for developing
protocols in different layers of the protocol stack, and finally these
parameters are also compared and tabulated. This analysis is
significant for researchers and designers to find the right simulator
for their research activities.
Abstract: This paper is aimed at proposing a rhombus shaped
wearable fractal antenna for wireless communication systems. The
geometrical descriptors of the antenna have been obtained using
bacterial foraging optimization (BFO) for wide band operation. The
method of moment based IE3D software has been used to simulate
the antenna and observed that miniaturization of 13.08% has been
achieved without degrading the resonating properties of the proposed
antenna. An analysis with different substrates has also been done in
order to evaluate the effectiveness of electrical permittivity on the
presented structure. The proposed antenna has low profile, light
weight and has successfully demonstrated wideband and multiband
characteristics for wearable electronic applications.