Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

Real time universal scalable wireless sensor network for environmental monitoring application

Real time universal scalable wireless sensor network for environmental monitoring application

Idakwo Monday Abutu, Umoh J. Imeh, Tekanyi M.S Abdoulie, Adedokun E. Adewale, Muazu M. Bashir

Статья научная

There are several wireless sensor network use for environmental monitoring applications. However, most wireless sensor network designed for real time environmental monitoring application are application specific and static in nature. Hence, the need for reprogramming of base station for every change in sensor type or the introduction of new sensor node into the network. More so, since these sensors nodes are deploy by end users in a random region of interest, it is necessary to develop a new plug and play mechanisms with more software modules and more user-friendly interface that is scalable to ease larger area deployment, installation and maintenance. Hence, this paper developed a base station with an auto detection and configuration system for detecting new sensor node, faulty nodes, and update user in real time. The developed system is implemented on a mesh topology network and was calibrated using standard Davis vantage pro2 weather station in Ahmadu Bello University Liquefied Natural Gas Environmental Laboratory and a mean error of 0.12 and root mean square error of 0.14 were obtained.

Бесплатно

Real-Time Encryption/Decryption of Audio Signal

Real-Time Encryption/Decryption of Audio Signal

M.I.Khalil

Статья научная

Encryption is a way to secure and verify data that are traded through public communication channels in the presence of intruder party called antagonists. Consequently, the transmitted or stored message can be converted to unreadable form except for intended receivers. The decryption techniques allows intended receiver to reveal the contents of previously encrypted message via secrete keys exchanged exclusively between transmitter and receiver. The encryption and decryption techniques can be applied equally to a message in any form such as text, image, audio or video. The current paper applies and evaluate two different encryption/decryption algorithms to the real-time audio signal. The first one is the well-known RSA encryption and decryption technique, while the second one is a new suggested algorithm based on symmetric cryptography concept. The Matlab Simulink simulator tool is used for acquiring the real-time audio signal and simulating the proposed algorithms. Considering the mathematical nature of the audio signal, the experimental results showed that the RSA method yields an audio signal with low quality while the suggested algorithm yields audio signal with high quality as exact signal as the original one.

Бесплатно

Realization of Efficient High Throughput Buffering Policies for Network on Chip Router

Realization of Efficient High Throughput Buffering Policies for Network on Chip Router

Liyaqat Nazir, Roohie Naaz Mir

Статья научная

The communication between processing elements is suffering challenges due to power, area and latency. Temporary flit storage during communication consumes the maximum power of the whole power consumption of the chip. The majority of current NoCs consume a high amount of power and area for router buffers only. Removing buffers and virtual channels (VCs) significantly simplifies router design and reduces the power dissipation by a considerable amount. The buffering scheme used in virtual channeling in a network-on-chip based router plays a significant role in determining the performance of the whole network-on-chip based mesh. Elastic buffer (EB) flow control is a simple control logic in the channels to use pipeline flip-flops (FFs) as storage locations. With the use of elastic buffers, input buffers are no longer required hence leading to a simplified router design. In this paper properties of buffers are studied with a test microarchitecture router for several packet injection rates given at an input port. The prime contribution of this article is the evaluation of various forms of the elastic buffers for throughput, FPGA resource utilization, average power consumed, and the maximum speed offered. The article also gives a comparison with some available buffering policies against throughput. The paper presents the synthesis and implementation on FPGA platforms. The work will help NoC designers in suitable simple router implementation for their FPGA design. The implementation targets Virtex5 FPGA and Stratix III device family.

Бесплатно

Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks

Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks

Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed, Mahmoud M. A. Eid

Статья научная

Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification was sought. The competing technology emerged: the first was Raman amplification. One reason was that the optical pump powers required for Raman amplification were significantly higher than that for Erbium doped fiber amplifier (EDFA), and the pump laser technology could not reliably deliver the required powers. However, with the improvement of pump laser technology Raman amplification is now an important means of expanding span transmission reach and capacity. We have deeply studied an analytical model for optical distributed Raman amplifiers (DRAs) in the transmission signal power and pump power within Raman amplification technique in co-pumped, counter-pumped, and bi-directional pumping direction configurations through different types of fiber cable media. The validity of this model was confirmed by using experimental data and numerical simulations.

Бесплатно

Recent Replica Placement Algorithms in P2P Networks – A Review

Recent Replica Placement Algorithms in P2P Networks – A Review

Kala Karun. A, Jayasudha. J. S

Статья научная

Peer-to-Peer (P2P) systems provide a platform for large internet scale distributed applications with no dedicated infrastructure. In P2P systems, applications are developed by dividing them across individual systems termed peers which take the role of both client as well as server. Popularity of objects in such a system can change rapidly, which demands the need for a rapid and light weight content replication strategy which considers this dynamic popularity changes. While considering P2P in distributed file sharing applications, data availability has significant impact on the system's performance. In addition to optimized availability, the replica placement should guarantee reduced search and data access latency. It should be dynamically adaptable to instantaneous query arrival rate as well as dynamic membership of individual peers. Also, it should provide good performance with reduced number of control messages. Thus an intelligent placement of replicas considering various factors of the system always outperforms a random placement of replicas on random peers. This paper reviews and compares various recent replica placement algorithms for structured as well as unstructured P2P networks.

Бесплатно

Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs

Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs

Prasanna Shete, R. N. Awale

Статья научная

Prolonging network lifetime by salvaging the energy of low battery capacity nodes is a prime concern in Wireless Sensor Networks. Energy efficient routing protocols try to improve the node lifetime by restricting their participation in the routing process. This leads to selfish node behavior causing disruption of inherent network cooperation. This paper proposes an elegant routing mechanism based on direct reciprocity principle, named energy efficient cooperative ad hoc on-demand distance vector (EECoAODV). Proposed protocol correctly differentiates between inherently selfish nodes that use the energy of other nodes to relay their packets, but refuse to reciprocate; and the energy critical nodes that have turned non-cooperative for their own survival. Selfish nodes are punished and eliminated from the routing process thus prolonging the battery capacity of energy critical nodes to improve the overall network performance. EECoAODV is implemented in Qualnet simulator and its performance is compared with conventional AODV and reinforcement based state-action-reward-action (SARSA) routing mechanism. Results show that EECoAODV improves the lifetime of energy critical nodes and thus delivers improved packet delivery ratio than SARSA-AODV and conventional AODV.

Бесплатно

Reconfigurable Intelligent Surface aided Indoor and Outdoor User Distribution in Heterogeneous Network

Reconfigurable Intelligent Surface aided Indoor and Outdoor User Distribution in Heterogeneous Network

Yamuna Devi M. M., Amalorpava Mary Rajee S., Ahila A., Indira N. R.

Статья научная

Millimeter wave communication suffers from static blockages such as trees, buildings and so on. Reconfigurable Intelligent Surfaces (RISs) has been adapted to solve this blockage problem and enable the urban environment user to choose mmW enabled small cells as their source transmitter or to choose macro cells in case of non-line of sight exists. RIS is a promising network technology to improve the quality of service parameters such as spectral efficiency and energy efficiency by artificially reconfiguring the propagation environment of electromagnetic waves. An indoor user can be connected with mmW band if the line of sight (LOS) link exists. Otherwise, the system utilizes RIS transmission model to have reliable and low-latency communication. It reflects the capability of RISs to enable enhanced communications in challenging environments. An optimization problem is formulated to maximize the sum data rate of an indoor user by phase shift optimization at the RIS. The outage probability of the proposed scheme is analyzed under Rician fading channel. The proposed RIS enabled method targets to enhance the overall performance in terms of average spectral efficiency and achievable data rate in the presence of blockages and system imperfections. The data rate is increased by three fold times than that of the transmission without RIS. The utility of this framework is discussed for both indoor and outdoor environments.

Бесплатно

Reduced complexity FSD algorithm based on noise variance

Reduced complexity FSD algorithm based on noise variance

Xinyu Mao, Shubo Ren, Haige Xiang

Статья научная

Multiple-input multiple-output (MIMO) system has very high spectrum efficiency. However, detection is a major challenge for the utilization of MIMO system. But even the fixed sphere decoding (FSD), which is known for its simplicity in calculation, requests too much computation in high order modulation and large number antenna system, especially for mobile battery-operated devices. In this paper, a reduced FSD algorithm is proposed to simplify the calculation complexity of the FSD while maintaining the performance at the same time. Simulation results show the effect of the proposed algorithm. Especially the results in a 4×4 64QAM system show that up to 81.2% calculation can be saved while the performance drop is less than 0.1dB when SNR=30.

Бесплатно

Reinforcement Learning Based Efficient Power Control and Spectrum Utilization for D2D Communication in 5G Network

Reinforcement Learning Based Efficient Power Control and Spectrum Utilization for D2D Communication in 5G Network

Chellarao Chowdary Mallipudi, Saurabh Chandra, Prateek Prateek, Rajeev Arya, Akhtar Husain, Shamimul Qamar

Статья научная

There are billions of inter-connected devices by the help of Internet-of-Things (IoT) that have been used in a number of applications such as for wearable devices, e-healthcare, agriculture, transportation, etc. Interconnection of devices establishes a direct link and easily shares the information by utilizing the spectrum of cellular users to enhance the spectral efficiency with low power consumption in an underlaid Device-to-Device (D2D) communication. Due to reuse of the spectrum of cellular devices by D2D users causes severe interference between them which may impact on the network performance. Therefore, we proposed a Q-Learning based low power selection scheme with the help of multi-agent reinforcement learning to detract the interference that helps to increase the capacity of the D2D network. For the maximization of capacity, the updated reward function has been reformulated with the help of a stochastic policy environment. With the help of a stochastic approach, we figure out the proposed optimal low power consumption techniques which ensures the quality of service (QoS) standards of the cellular devices and D2D users for D2D communication in 5G Networks and increase the utilization of resources. Numerical results confirm that the proposed scheme improves the spectral efficiency and sum rate as compared to Q-Learning approach by 14% and 12.65%.

Бесплатно

Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Ibrahim S. I. Abuhaiba, Huda B. Hubboub

Статья научная

In this paper, we introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Our approach is to swap Directed Diffusion reinforcement rule which means that the good route is excluded and the bad route is included. Moreover, our attack is activated and deactivated periodically to prolong its lifetime and hence brings down the target network. For the proposed attack, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

Бесплатно

Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method

Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method

Ranjan Kumar Dash, Deepak Kumar Panda

Статья научная

The work carried out in this paper first generates all edge-disjoint minimal paths between every pair of nodes of the interconnection network. Then the merging of the edge disjoint minimal paths from each source nodes to the rest of nodes occurs only if such merging of minimal paths does not result into cycle. Thus, the merging operation ensures connectivity of all nodes of interconnection network without any cycle which is equivalent to the generation of spanning trees. In this manner, a number of spanning tree rooted on each source node are generated and ranked according to their generation. The network reliability is then evaluated from these spanning trees by applying sum of disjoint product techniques on these trees. A mathematical model followed by an algorithm is proposed in this paper. The proposed method is well illustrated by taking a suitable example network. The simulated results obtained from the proposed method are validated against existing method. The validation results show a tolerable level discrepancy in estimating the network reliability of some benchmark networks while using a very less number of spanning trees in leu of all possible spanning tress. The network reliability of some important interconnection networks viz. Hypercube, crossed cube, folded hypercube, mesh and torus are evaluated and analyzed. The network reliability of fully connected network with size varying from 3 to 10 are evaluated and analysed.

Бесплатно

Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks

Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks

Sateesh Gudla, Kuda Nageswara Rao

Статья научная

Wireless sensor networks (WSNs) has been envisioned as a potential paradigm in sensing technologies. Achieving energy efficiency in a wireless sensor network is challenging since sensor nodes have confined energy. Due to the multi-hop communication, sensor nodes spend much energy re-transmitting dropped packets. Packet loss may be minimized by finding efficient routing paths. In this research, a routing using fuzzy logic and reinforcement learning procedure is designed for WSNs to determine energy-efficient paths; to achieve reliable data delivery. Using the node’s characteristics, the reward is determined via fuzzy logic. For this paper, we employ reinforcement learning to improve the rewards, computed by considering the quality of the link, available free buffer of node, and residual energy. Further, simulation efforts have been made to illustrate the proposed mechanism’s efficacy in energy consumption, delivery delay of the packets, number of transmissions and lifespan.

Бесплатно

Reliable and Power Efficient Routing Protocol for MANETs

Reliable and Power Efficient Routing Protocol for MANETs

V.Sowmya Devi, Nagaratna P Hegde

Статья научная

In this paper, we focused on of the most proliferated network that is Mobile Adhoc Network (MANET). Due to the dynamic nature and limited power of nodes, the routes will fail frequently which intern cause high power dissipation. This paper proposed a reliable and power efficient routing with the nodes having high power level. As well as, this approach also concentrated on the reduction of power consumption during route failures by adapting an on-demand local route recovery mechanism through a set of helping nodes and they are called as Support Nodes (SN). The cooperation of support nodes will reduce the power consumption and significantly increases the reliability. The performance of proposed approach was evaluated through average energy consumption, packet delivery ratio and end-to-end delay over varying node speed and varying packet size. The power optimization and reliability achieved by the proposed approach gives an ideal solution to the future communication in MANETs for a long time.

Бесплатно

Research of Emergency Vehicles Information System Based on SOA

Research of Emergency Vehicles Information System Based on SOA

Guangliang Li, Minghai Yao

Статья научная

Using Service-Oriented Architecture (SOA) to build an information system is a hot topic at present. The primary goal of this paper is to investigate how to build a SOA-based information system in a special industry-the field of emergency vehicles in environment protection industry. The paper provides a presentation of current compositions of the emergency vehicles information system and then gives out the system structure. The paper proceeds with the business process flow and working principle of an emergency vehicle information system. A service-oriented architecture framework for emergency vehicles information system is proposed.

Бесплатно

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Vikram Jeet Singh, Vikram Kumar, Kishori Lal Bansal

Статья научная

The technological developments in the fields of multimedia clinical applications and communication networks require a specific analysis to increase the efficiency of network based healthcare services. In this work, we computed the optimum transmission parameter (data packet size) for applications needed to guarantee the perceived quality of service in the proposed ubiquitous healthcare network. This has been carried out through NS2 based simulation of a state wide area network infrastructure implemented in Himachal Pradesh, a state with diverse geographical terrain situated in the Western Himalayan region of India. The various types of healthcare applications and services have been classified into different classes according to their perceived QOS requirements as per the guidelines in ITU report on network performance objectives. The infrastructure specific optimum values of data packet size for these QoS classes have been computed. Network based healthcare applications and services running on both TCP and UDP type of traffic have been presented in this paper.

Бесплатно

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

SHI Lei, WANG Qiang, Wu lijun

Статья научная

This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the desired track, it must return immediately, and while doing so, the obstacle avoidance behavior and the effectiveness of such a path are not guaranteed. So, motion control is a difficult task, especially in real time and high speed control. To achieve good control performance and requirements for timeliness, accuracy to identify and approach the ball, the paper designs a sugeno fuzzy control system, which could make robot complete the whole football performance, including finding, approaching and shooting ball. At the end of the paper, to validate the proposed fuzzy algorithm, the experiment on METALFIGHTER-2 humanoid robot has been run, which showed that the fuzzy controller is effectiveness and robustness.

Бесплатно

Research on Trusted Industrial Control Ethernet Network

Research on Trusted Industrial Control Ethernet Network

ZHOU Sen-xin, HAN Jiang-hong, TANG Hao

Статья научная

Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks emerged in recent years in order to provide solutions for the increasing requirements on networked services. We propose a trust evaluation model for industrial control Ethernet network. Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of trusted industrial control Ethernet networks.

Бесплатно

Research on the method of multi-channel video acquisition and display based on FPGA

Research on the method of multi-channel video acquisition and display based on FPGA

Jingbo Xia, Xiaohuan Zhao, Weiwu Guo

Статья научная

With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by using the field-selected algorithm. The four-channel video can be outputted to LCD with the technique of ping-pang cache. The LCD display sequences are generated by the finite state machine using Verilog HDL. The system is simple, flexible and with high-quality, and it has a broad application prospect.

Бесплатно

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Manjusha Pandey, Shekhar Verma

Статья научная

Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.

Бесплатно

Resource Provisioning for Routing with Priorities

Resource Provisioning for Routing with Priorities

Subarno Banerjee, Supriya Roy, P. K. Guha Thakurta

Статья научная

In this paper, a novel load balancing technique is proposed to handle biased call request patterns efficiently. The knowledge of call request patterns is used from trace-based analysis; call patterns are affected by various factors such as geographical context, user mobility, network usage patterns and temporal bias. A call routing system is modelled as a network of queues and a provisioning algorithm is developed. The proposed model employs a combination of predictive and reactive provisioning methods. The idea of Capacity Distribution is introduced- a heuristic for heterogeneous capacity allocation among adjacent cell pairs. The proposed model retains simplicity while being able to effectively learn from the variations in call patterns. The performance of the model is evaluated using extensive simulation techniques.

Бесплатно

Журнал