International Journal of Sensors Wireless Communications and Control - Volume 10, Issue 2, 2020
Volume 10, Issue 2, 2020
-
-
Random Black Hole Attack Modelling and Mitigation Using Trust-Confidence Aware OLSR in MANETs for Private Data Communications
Authors: Kirti A. Adoni, Anil S. Tavildar and Krishna K. WarhadeBackground and Objective: Random Black Hole (BH) attack significantly degrades MANET’s performance. For strategic applications, the performance parameters like Packet Delivery Ratio, Routing Overheads, etc. are important. The objectives are: (a) To model random BH attack, (b) To propose a routing strategy for the protocol to mitigate random BH attack, (c) To evaluate and compare the network performance of modified protocol with the standard protocol. Methods: The random BH attack is modelled probabilistically. The analysis is carried out by varying Black Hole Attack (BHA) time as Early, Median, Late occurrences and mix of these three categories. The blocking performance is also analysed by varying the percentages of malicious presence in the network. Normal Optimized Link State Routing (OLSR) protocol is used to simulate the MANET performance using a typical medium size network. The protocol has then been modified using Trust- Confidence aware routing strategy, named as TCAOLSR, with a view to combat the degradations due to the random BH attack. Results: The random behavior of Black Hole attack is analyzed with all the possible random parameters, like deployment of mobile nodes, number of malicious nodes and timing instances at which these nodes change their state. From the results of individual type- Early, Median and Late, it is observed that the TCAOLSR protocol gives stable performance for Packet Delivery Ratio (PDR) and Routing Overheads (RO), whereas for OLSR protocol PDR gradually reduces and RO increases. For individual and mix type, Average Energy Consumption (AEC) per node increases marginally for TCAOLSR protocol. For the mix type, PDR for TCAOLSR is 40-60% better whereas RO for TCAOLSR is very less compared to OLSR protocol. The efficacy of the TCAOLSR protocol remains stable for different categories of BH attack with various percentages of malicious nodes compared to OLSR with the same environment. Conclusion: Simulations reveal that the modified protocol TCAOLSR, effectively mitigates the network degradation for Packet Delivery Ratio and Routing Overheads considerably, at the cost of a slight increase in Average Energy Consumption per node of the network. Efficacy of the OLSR and TCAOLSR protocols has also been defined and compared to prove robustness of the TCAOLSR protocol.
-
-
-
A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices
Authors: Showkat A. Bhat and Amandeep SinghBackground & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm. Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.
-
-
-
Sum-Rate Optimization Constrained by Consumed Power for Multi-Antenna Non-Regenerative Relay Network
Authors: Maryam Alibeigi and Shahriar S. MoghaddamBackground & Objective: This paper considers a multi-pair wireless network, which communicates peer-to-peer using some multi-antenna amplify-and-forward relays. Maximizing the throughput supposing that the total relay nodes’ power consumption is constrained, is the main objective of this investigation. We prove that finding the beamforming matrix is not a convex problem. Methods: Therefore, by using a semidefinite relaxation technique we find a semidefinite programming problem. Moreover, we propose a novel algorithm for maximizing the total signal to the total leakage ratio. Numerical analyses show the effectiveness of the proposed algorithm which offers higher throughput compared to the existing total leakage minimization algorithm, with much less complexity. Results and Conclusion: Furthermore, the effect of different parameters such as, the number of relays, the number of antennas in each relay, the number of transmitter/receiver pairs and uplink and downlink channel gains are investigated.
-
-
-
Evaluation of the Performance of a Reed Solomon Coded STBC MIMO System Concatenated with MPSK and MQAM in Different Channels
Authors: Pradeep B. Mane and Madhavi H. BelsareBackground & Objective: Wireless technologies like Wi-Fi, WiMAX, and LTE are using Multiple Input, Multiple Output (MIMO) communications that play an important role in achieving high data rates. Bit Error Rate (BER) is one of the most important performance parameters in multipath channels for data communication. Methods: This research proposes a new method based on Reed Solomon (RS) coding to improve the efficacy of a Space-Time Block Coded (STBC) MIMO System concatenated with M-ary Phase Shift Keying (MPSK) and M-ary Quadrature Amplitude Modulation (MQAM) in reducing BER in Rayleigh, Rician and Nakagami channels. It is based on the error detection and correction properties intrinsic to RS coding processes. Binary data is coded using an RS encoder and the modulated signal STBC encoded and transmitted through Rayleigh, Rician and Nakagami channels. Signals received by two antennas are STBC decoded, demodulated, RS decoded and tested for BER. Results & Conclusion: Results show lower BER rates for RS Coded systems as compared for uncoded systems in all three channels. In addition, it was found that reduction in BER is greater for high Signal to Noise Ratio (SNR) but deteriorates for low SNR. Furthermore, this research observed that RS coding gives 63% to 98% improvement in BER in the Rayleigh as compared to Rician and Nakagami channels. This research has been able to successfully incorporate the BER reduction of STBC MIMO to further enhance the efficacy of an STBC MIMO system.
-
-
-
Delay Aware and Lifetime Enhanced Sectoring (DALES) Routing Protocol for Heterogeneous Wireless Sensor Network
Authors: Suniti Dutt, Nikita Shandil, Sunil Agrawal and Renu VigBackground & Objective: Wireless communication technologies are continually growing in diverse areas, which are providing unexampled research opportunities in the areas of networking. One such speedily developing orbit is Wireless Sensor Networks. The ability of these networks to operate in human-inaccessible terrains and hazardous locations have attracted a lot of research for addressing various difficulties presented by these networks at different layers. Routing is a challenge due to the unpredictable topology of WSNs. Further, there exists a wide range of applications employing WSNs which operate in a hostile environment. The presence of a hostile environment literally means that the operating devices fail quite frequently and it is practically infeasible to repair them and replenish their energy resources. Further, many real-time applications of WSN do not tolerate any latency in the network. In general, designing an energy-efficient routing scheme that can tradeoff between different design metrics, like delay, is a crucial issue in WSNs. Due to a great deal of speculations and future prognoses regarding the Internet of Things, WSN design faces various design goals that often conflict with each other, such as short delay, high throughput, minimal energy consumption, and low cost. Network design for futuristic applications must consider many factors for achieving trade-offs among multiple objectives to achieve optimal performance for network. Methods: This paper proposes a routing protocol named Delay Aware and Lifetime Enhanced Sectoring (DALES) for joint optimization of lifetime and delay in a heterogeneous WSN. It alters the CH selection process by sectoring the WSN field, barring certain nodes from participating in clustering and selecting an optimal number of CHs by use of modified probability equations. Conclusion: Simulation results establish that proposed solution ameliorates in terms of network lifetime and delay as compared to other routing protocols.
-
-
-
Design and Development of MEMS Sensors Based Inertial Navigation Systems for Aerial Vehicles: A Case Study
Authors: Amanpreet Kaur, Archana Mantri and Vipan KumarBackground & Objective: MEMS sensors are rapidly growing as a sensing technology in all spheres of science and engineering. MEMS technology is playing an important role in avionics for miniaturization of systems and MEMS based Inertial Navigation System (INS) is one of the example. The situational awareness and performance of an aerial vehicle is computed with the help of an INS. This paper describes the case study for design of MEMS based low cost rugged INS for aerial vehicles. The 9 Degrees of Freedom (DOF) that are obtained from the sensors provide an inaccurate attitude information of aerial vehicles due to presence of external accelerations and the gyroscopic drifts in MEMS sensors. In order to overcome such problems and for the precise and reliable computation of orientation information, the error characteristics of accelerometers, magnetometers and gyroscopes have been combined into a sensor fusion algorithm with ‘Kalman Filter’ to compute the accurate orientation information. The processing has been done on STM32F407VGT6 microcontroller board. An accuracy of ± 0.1 degrees is achieved for Roll and Pitch and ± 1.0 degrees for Yaw have been obtained. The experimental results have been obtained in statically (keeping the device in a static position) and dynamically (rotating the device at different angles along roll, pitch and yaw axis) at room temperature of 22°C. Methods: The design is different in a way that it has used a unique combination of trio MEMS sensors network consisting of FXOS8700CQ Accelerometer, FXAS21000 Gyroscope, FXOS8700CQ Magnetometer. Results: The attitude estimation algorithm has been implemented on the 32-bit microcontroller. The information data is processed and displayed on 88.9 mm TFT-LCD through Graphical User Interface (GUI).
-
-
-
A Comparison of Norm Based Antenna Selection and Random Antenna Selection with Regard to Energy Efficiency in Wireless System with Large Number of Users
Authors: Ashu Taneja and Nitin SalujaBackground: The paper considers the wireless system with large number of users (more than 50 users) and each user is assigned large number of antennas (around 200) at the Base Station (BS). Objective: The challenges associated with the defined system are increased power consumption and high complexity of associated circuitry. The antenna selection is introduced to combat these problems while the usage of linear precoding reduces computational complexity. The literature suggests number of antenna selection techniques based on statistical properties of signal. However, each antenna selection technique suits well to specific number of users. Methods: In this paper, the random antenna selection is compared with norm-based antenna selection. It is analysed that the random antenna selection leads to inefficient spectral efficiency if the number of users are more than 50 in Multi-User Multiple-Input Multiple Output (MU-MIMO) system. Results: The paper proposes the optimization of Energy-Efficiency (EE) with random transmit antenna selection for large number of users in MU-MIMO systems. Conclusion: Also the computation leads to optimization of number of transmit antennas at the BS for energy efficiency. The proposed algorithm results in improvement of the energy efficiency by 27% for more than 50 users.
-
-
-
A Transmission Power Control Mechanism for 802.15.4+RPL-Operated Wireless Sensor Network
Authors: Ali Qolami, Mohammad Nassiri and Hatam AbdoliBackground and Objective: Wireless Sensor Networks (WSNs) are typically formed by one or more sink nodes and a large number of sensor nodes that are able to sense, process and transmit data. Topology control mechanisms can be utilized to guarantee requirements such as connectivity, coverage, delay and network lifetime in WSNs. One effective way to control the topology is adjusting transmission power level in each node according to the link quality conditions. The goal of Transmission Power Control (TPC) is to set the transmission range of each node by adjusting its transmission power level. Methods: In this paper, we investigate TPC in 802.15.4+RPL WSNs. In our proposed mechanism, each node dynamically adjusts its transmission power based on channel conditions before sending every data and ACK packet. Result and Conclusion: The results of extensive simulations confirm that our power control method improves network performance, especially in terms of network lifetime, which is an essential issue in WSNs.
-
-
-
Cooja Based Approach for Estimation and Enhancement of Lifetime of 6LoWPAN Environment
Authors: Ruchi Garg and Sanjay SharmaBackground and Objective: The Scale with which Internet of Things (IoT) is penetrating our day to day life, time is not far away when it would be the Internet of Everything (IoE) that will require billions of devices to communicate with each other in the real world. To cater to the same, Wireless Sensor Network (WSN) is composed of 6LoWPAN sensor-nodes, which are mainly battery operated. One of the major issues, in such network, is nodes’ limited lifetime which is battery dependent. Methods: In this paper, we have suggested and implemented an approach for ‘Estimation and Enhancement of Lifetime of Wireless Sensor Network’ (E&EL-WSN). The aim of our study is to suggest an approach that helps in power saving of the batteries of sensor-nodes and will result in enhanced life-time of 6LoWPAN environment. Our suggested approach is based on the concept of reduced packet size resulting in saving of power consumption. Packet size is reduced by our Modified and Improved Header Compression (MIHC) method of IPv6 header compression. Results: The simulation, done in Cooja, shows, in our case, an improvement of approximately 19% saving of power consumption. This results in an enhancement of 70 days in the lifetime of the network, which is almost 23% better than the existing approach.
-
-
-
Optimization Based Sink Deployment Technique in WSN to Improve Network Performance
Authors: Sonal T. Chandel and Sanjay SharmaBackground & Objective: Currently, WSN (Wireless Sensor Networks) provides a variety of services in industrial and commercial applications. WSN consists of nodes that are used to sense the environments like humidity, temperature, pressure, sound, etc. As the use of WSN grows there are some issues like coverage, fault tolerance, a deployment problem, localization, Quality of Service, etc. which needs to be resolved. Sink deployment is a very important problem because it is not the only impact on performance, but also influence on deployment cost. In traditional WSN, a single sink is deployed in the network, which aggregates all the data. Due to this, the whole network is suffering from some serious issues like delay, congestion, network failure that reduces network performance. Methods: One solution is to deploy multiple sinks instead of a single sink. Deploying multiple sinks can improve network performance, but increases sink deployment cost. In this paper, an ISDOA (Improved Sink Deployment Optimization Algorithm) is proposed to find the optimum number of sinks and their optimum location in ROI. Simulation is carried out in Matlab simulator. The impact of sensors and sinks on various network performance parameters like throughput, network lifetime, packet delivery ratio, energy consumption and cost of the network is analyzed. Results & Conclusion: It is shown by simulation results that the number of sinks varies inversely with energy consumption of the nodes; and it is linearly proportional to the network lifetime, throughput and packet delivery ratio. Furthermore, results show that the proposed approach outperforms random deployment with 25% higher throughput, 30% better network lifetime, 15% lesser energy consumption and 21% optimized cost of the network, respectively.
-
-
-
Error Rate Performance of Potential Multicarrier Waveforms and Coding Techniques for 5G
Authors: Bhanu Priya and Jyoteesh MalhotraBackground: The wisdom of future wireless communication is clearly highlighted by the gigabit experience, low latency and the three fold rises in the capacity, compared to the 4th Generation networks. To meet such an ambitious objective of the 5th Generation communication systems, efficient use of non-contiguous unused spectrum is required. The panacea to this issue lies in the symbiosis of multicarrier waveforms and coding schemes. Methods: To study the interaction between these two, several multicarrier waveforms like Filtered- OFDM (F-OFDM), Universal Filtered Multi-Carrier (UFMC) and Weighted Overlap and Add (WOLA) which act as a powerful contender to win the 5G candidate waveform race, are analyzed in Low-Density Parity Check Codes (LDPC), Polar and Turbo coded representative Third Generation Partnership Project (3GPP) channel models under a common numerology framework. This article dwells upon the error rate and throughput performance of different modulation formats and coding schemes appropriate for the 5G in a well-defined multi-cellular environment. Results and Conclusion: The results have shown that even though many waveforms and coding techniques may pave the route towards its adoption as a physical layer standard instead of classical OFDM and convolution codes but no one is a clear conqueror as their selection depends upon the considered environment and type of traffic.
-
-
-
Integration of Fuzzy Logic and ABC Algorithm for Optimized Network Selection in Heterogeneous Wireless Environment
Authors: Shilpa R. Litake and Prachi MukherjiBackground & Objective: Various Radio Access Technologies are integrated in the next generation of Heterogeneous Wireless Networks. The coexistence of various kinds of wireless access networks ensures high service quality (QoS) for the users. Seamless vertical handover plays a significant role in providing ubiquitous access to users. The ability to select the optimal access network out of available access networks decides the comprehensive performance of the system. A novel scheme: Handoff Urgency Estimator and Target Access Network Selector using Artificial Bee Colony algorithm (HUETANSABC) for deciding the necessity of handover and selection of the best network is proposed in this paper. The objective of the proposed work is to choose the most promising access network out of available coexisting networks for enhancing user experience. Fuzzy logic provides reliable results even when the input parameters are random in nature and can not be defined precisely. Artificial Bee Colony is an effective method for searching and optimization. Proposed system combines best of fuzzy logic and ABC algorithm for timely initiation of vertical handover. To gather the required information for handover, services provided by IEEE 802.21 standard are utilized. Proposed integration of fuzzy logic and the ABC algorithm has resulted in a decreasing number of unnecessary handovers. Methods: The effect of varying context parameters is analyzed using Fuzzy Inference System to estimate the urgency of handover. The optimization of a target access network selection process is achieved using meta-heuristic method. Results: Simulation results on MATLAB indicate that the proposed system performs better than ABC and Multiple Attribute Decision Making (MADM) techniques.
-
-
-
RACOD: Routing Using Ant Colony Optimization in DTN
Authors: Naveen Singh and Awadhesh SinghBackground & Objective: Routing is a popular challenge in ad hoc networks. A routing algorithm developed for one type of ad hoc network may be adapted for other. However, such adaptation is very difficult for Delay Tolerant Network (DTN) due to special DTN characteristics like latency, intermittency, disruptions, etc. and its applications in hostile environments like extreme terrestrial and space. Methods: We have used Ant Colony Optimization (ACO) to develop a routing algorithm suited to DTNs. The ants wander for food and after few epochs they find shortest path to it. The ant’s movement in ACO can be mapped with propagation of messages that are replicated in DTN and look for their destination. Also, we apply an efficient buffer management method to boost the performance of our routing algorithm. Results & Conclusion: To highlight the effectiveness of our algorithm, the simulation results have been compared with some leading algorithms available in the literature and have found that our algorithm produces better result than other algorithms in terms of delivery, overhead and probability ratio.
-
-
-
Audio Watermarking Art of Hiding Copyright Information for Piracy Control
More LessBackground & Objective: Revolution in digital multimedia is a boon to music industries, music creators for decades as digital music can be created, stored replicated and transferred easily and efficiently. But digitalization of multimedia becomes a curse when the multimedia content is illegally and freely distributed, shared across the network online or offline. Countering the illegal copying and distribution of digital media is the driving force behind the evolution of copyright protection and digital watermarking techniques. Methods: This paper presents the problem of piracy and the overview of the evolution of different digital audio watermarking techniques in time, transformed and compression domains to counter the problem of music piracy. The limitations of the audio watermarking techniques and the future scope for improvement are also presented. Results & Conclusion: This paper summarizes the evolution of audio watermarking techniques and reviews the existing watermarking techniques applied on audios. The limitations of the audio watermarking techniques and the future scope for improvement are also proposed. Additionally, the preliminaries for audio and brief of the properties which are exploited for watermarking of audio are presented.
-
-
-
Indoor Location Tracking Using Time of Arrival Estimation Method
Authors: Nandita Sreekumar and Shoney SebastianBackground & Objective: Location-based services enable collection of location-oriented information which finds use in various fields. Methods: With its utility found in so many applications, various localization techniques are adopted to improve these services. One such property of a signal which is used for these estimations is known as ‘Time of Arrival’ property. The ‘Time of Arrival’ property of a signal is the time difference for a signal to go from the transmitter to the receiver. The most common application is to navigate through places, finding or tracking your personal belongings, targeted advertisements by knowing the nearby popular places and various other services like augmented reality gaming among others. Results & Conclusion: Through this paper, we demonstrate a method to track the location of a mobile sensor node using Trilateration algorithm with the help of Time of Arrival (ToA) property of signals. The time of arrival of packets at each node is recorded and data collected from the simulation of a wireless sensor network for this experiment is spread across various distributions to find the optimum statistical inference.
-
Most Read This Month
