International Journal of Sensors Wireless Communications and Control - Volume 10, Issue 3, 2020
Volume 10, Issue 3, 2020
-
-
Performance Analysis of Efficient and Low Complexity MIMO-OFDM System Using Modified V-BLAST
Authors: Brijesh K. Yadav and Rabindra Kumar SinghBackground & Objective: To analyze the performance of MIMO-OFDM system, VBLAST detection suffers from computational complexity as well as high BER. Methods: To improve the BER performance and to reduce the computational complexity of receiver, we propose a modified VBLAST detection in MIMO-OFDM Systems. Results: Simulation using MATLAB shows the improvement in computational complexity and in BER. Conclusion: This modified VBLAST reduces the complexity of MIMO-OFDM System to 44.2% and improvement in BER as compared to conventional VBLAST based MIMO-OFDM System.
-
-
-
Weighted Multipath Energy-Aware Clustered Stable Routing Protocol for Mobile Ad Hoc Networks
Authors: Anubhuti Mohindra and Charu GandhiBackground & Objective: Mobile ad hoc networks are defined as highly dynamic, leading to frequent disconnections and changing topologies. The energy and stability of power limited nodes needs to be managed while designing the protocol & clustering helps in reducing the problem of network congestion due to information overhead in large sized networks. Multipath routing helps in balancing the load and node failures in a dynamic environment thereby helping to solve the problem of congestion. This paper proposes a new multipath, energy-aware and stable routing protocol – Weighted Multipath Energy-aware Clustered Stable routing protocol (WMECS). Methods: It uses weighted approach in clustered mobile adhoc networks. In this, both cluster head as well as path selection is done using an optimal energy and mobility model. This helps in attaining stable and energy efficient network with prolonged lifetime. The energy model considers energy metrics like transmission power, drain rate and power load that helps in constructing a network with lower energy consumption. We have also considered Gauss-Markov Mobility Model to handle the mobility of nodes and attain a stable network with less re-clustering and re-affiliations by choosing low relative mobility nodes in every cluster. Multipath selection is done based on a weighted metric that considers energy and mobility coefficients whereas Optimal Paths are selected on the basis of lower weight. Results: Simulation results show that the proposed protocol has better performance when compared with other related protocols in terms of Energy Consumption, Network Lifetime and end to end delay.
-
-
-
An Efficient Fitness Function for Clustering of Wireless Sensor Networks
More LessBackground & Objective: A sensor network is composed of a large number of sensor nodes that are deployed to perform measurement and/or command and control in a field. Sensor nodes are battery powered devices and replacement or recharging of their batteries may not be feasible. One of the major challenges with sensory wireless networks is excessive energy consumption in nodes. Clustering is one of the methods that has been offered for resolving this issue. In this paper, we pursue evolutionary clustering and propose a new fitness function that har-nesses multiple propagation indices. Methods: In this paper we develop an efficient fitness function by first selecting the best clusters, and then selecting the best attribution of cluster to clusters. The distance between the nodes and relevant cluster heads was used for the mathematical modelling necessary. In the end we develop the fitness function equation by using normalization of the raw data. Results: Simulation results show improvement compared to previous fitness functions in clustering of the wireless sensor networks.
-
-
-
A Framework with Enhanced Security for Service Oriented Architecture
Authors: Anurag Shashwat, Deepak Kumar and Lovneesh ChananaBackground: Service Oriented Architecture is one of the acceptable frameworks for application development which provides better functionality such as composability, reliability, reusability, distributed deployment and interoperability which meet enterprises dynamics. So, SOA framework is a point of attraction for consumers. Objectives: However, SOA framework fails to provide security at a granular level. Along with SOA functionality, the consumer also needs a secure environment so that each application can be reliable. Methods: SOA functionality like modularity and reusability are helpful in cross-organization context but these quality requirements reduce the security of the applications. In the past years, many security techniques have been provided by different researchers, still, security is a concern of SOA framework. Result: Most of the research focus security enhancement at higher layers of SOA reference architecture only so that SOA functionality remains unaffected. In this paper, the author(s) provided a framework which enhances the security at both the higher layer and lower layer. Conclusion: Also, this framework focuses on security enhancement at the granular level so that application-level security can be enhanced. The author(s) also included a technique to keep SLA similar to the exiting application after the implementation of security at each layer. This framework will be helpful in enhancing the end to end security and reliability of an application.
-
-
-
A Fuzzy Enabled Genetic Algorithm for Task Scheduling Problem in Cloud Computing
Authors: Mohit Agarwal and Gur M. Saran SrivastavaBackground & Objective: Cloud computing emerges out as a new way of computing which enables the users to fulfill their computation need using the underlying computing resources like software, memory, computing nodes or machines without owning them purely on the basis of pay-per-use that too round the clock and from anywhere. People defined this as the extension of the existing technologies like parallel computing, distributed computing or grid computing. Lots of research have been conducted in the field of cloud computing but the task scheduling is considered to be the most fundamental problem which is still in infancy and requires a lot of attention and a proper mechanism for the optimal utilization of the underlying computing resources. Task scheduling in cloud computing environment lies into the category of NP-hard problem and many heuristics and Meta heuristics strategies have been applied to solve the problem. Methods: In this work, Fuzzy Enabled Genetic Algorithm (FEGA) is proposed to solve the problem of task scheduling in cloud computing environment as classical roulette wheel selection method has certain limitations to solve complex optimization problem. Results & Discussion: In this work, an efficient fuzzy enabled genetic algorithm based task scheduling mechanism has been designed, implemented and investigated. The efficiency of the proposed FEGA algorithm is tested using various randomly generated data sets in different situations and compared with the other meta-heuristics. Conclusion: The authors suggest that the proposed Fuzzy Enabled Genetic Algorithm (FEGA) to solve the task scheduling problem helps in minimizing the total execution time or makespan and on comparing with other Meta-heuristic like genetic algorithm and greedy based strategy found that FEGA outperforms the both in different set of experiments.
-
-
-
Automated Irrigation System Based on LoRa and ML for Marginal Farmers
Authors: Selvam Loganathan and Kavitha PerumalBackground & Objective: India is one of the foremost agricultural producers in the world; on the other hand, the consumption of water for agricultural purposes in India has been among the highest in the world. Indiscriminate use of inadequate irrigation techniques has led to a critical water deficit in the country. Now with the development of (IoT) Precision Farming and Precision Irrigation are becoming very popular. This paper proposes a cost-effective Automated Irrigation System based on LoRa and Machine Learning, which can be of great help to marginal farmers, for whom agriculture is hardly a profitable venture, mainly due to water scarcity. Methods: In this automated system, LoRa technology is used in Sensor and Irrigation node, in which sensors collect data on soil moisture and temperature and send it to the server through a LoRa gateway. Then the data is fed into a Machine Learning algorithm, which leads to correct prediction of the soil status. Results: Hence, the field needs to be irrigated only if and when it is needed. Conclusion: The system can be remotely monitored using a web application that can be accessed by a mobile phone.
-
-
-
WSN Based Embedded System for Field Parameter Monitoring Inside a Low-Cost Polyhouse
Authors: Manash P. Goswami, Sudipta Hazarika, Durlove Bora and Utpal SarmaBackground & Objective: This paper presents a wireless sensor network for monitoring field parameters inside a low-cost polyhouse. The micro climate inside a polyhouse differs from that on the outside, which provides a favorable condition for unseasonal crops. Methods: The physical parameters associated with the polyhouse’s microclimate were monitored by a reliable low-cost wireless sensor network, which in turn helps to take decisions for enhancing yield quality and quantity. Sensor network development, signal conditioning, calibration of the soil temperature measurement system and field experience of the installed system are discussed in this paper. The field parameters for the growing period of cucumber (Cucumis sativus) inside the polyhouse are provided in the paper. Results & Conclusion: It showed significant variations in temperature, relative humidity and wind speed inside the polyhouse to that of the outside. It was also observed that soil temperature, soil moisture in mulched soil differed from that of the open condition. Enhancement of the crop yield was found for mulched soil.
-
-
-
An Efficient Multipath Routing Protocol for Decentralized Wireless Sensor Networks for Mission and Safety-Critical Systems
Authors: Olakanmi O. Olufemi and Adama PamelaBackground: Wireless Sensor Network (WSN) is a useful integral part of mission and safety-critical systems, whose failure may result in injury, loss of life, serious environmental damage and/or may result in the failure of some goal-directed activities. Its major challenges are reliability, and security related issues during data delivery. To mitigate these, the development of secure routing protocols, which are capable of optimum utilization of WSNs’ nodes resources for effective data delivery, has been one of the major research interests. However, most of the existing single path routing protocols for WSNs are not able to meet with up with the performance requirements of the mission and safety-critical systems. Meanwhile, a few that are multipath require high computational power, energy and their multiple paths are not ranked, this makes them unsuitable as routing protocol for WSNs in mission and safety-critical systems. Objective: In this work, we propose a secure multipath routing protocol based on sectorisation and best neighbouring nodes selection models to meet up with the performance requirements of WSNs in the mission and safety-critical systems. The protocol is capable of providing optimal multiple ranked route paths for reliable data delivery. Methods: A route management technique, using direct approach, is developed for selecting different optimal data paths for reliable data routing. Also, simple but efficient lightweight privacy preserving authentication scheme is proposed for the protocol to ensure security and privacy during data routing. Computational and security analysis were performed to ascertain its efficiency in terms of computational cost, energy consumption and security. Results: The results showed that SMRP achieved better performance compared to the two stateof- the-art solutions in terms of end-to-end delay, energy consumption and data routing reliability. Conclusion: The proposed protocol is suitable for wireless sensor network due to its low delay, low energy consumption and routing reliability metrics.
-
-
-
Separating Monitoring from Control in SDN to Mitigate DDoS Attacks in Hybrid Clouds
More LessBackground & Objective: Detecting and mitigating Distributed Denial of Service (DDoS) attacks is a serious problem. In addition, new features and network deployments such as Software- Defined Networking (SDN) may open the door for new threats that did not previously exist. Recent publications and patent are reviewed to find new techniques developed for integrating different mechanisms to secure networks against DDoS. Methods: This work presents a simple model for integrating different mechanisms to secure both SDN and legacy network in a hybrid cloud environment, it is called FocusON. It aims at mitigating DDoS attacks of a victim network. In addition, separating network monitoring from its control aims at mitigating DDoS attacks of a victim network. Traffic pattern analysis is apart from attack detection mechanism that gives a conceptual representation of a specific kind of DDoS attacks. DDoS detection is a completely automated process. Once called, for the reaction, the active response will be taken against the real IP source of the attacker. The communication time overhead was tested in order to evaluate the remote server response time in case of deploying our proposed model mechanisms and without our proposed model. Here we introduce a response mechanism that consists of an analysis of event logs, traffic patterns, and IP traceback. The proposed model categorizes the underlying network according to the location into a victim network and the source of attack (public cloud). Results & Conclusion: The proposed model implemented in a hybrid cloud environment using the network of SDN and legacy network. The experimental setup was built using our network lab connected to the Amazon public cloud.
-
-
-
A QoS Based Formal Model for Software Defined Network
Authors: Vivek Srivastava and Ravi S. PandeyBackground and Objective: Software-Defined Networks (SDN) decouple the responsibility of data plane, control plane and aggregates responsibilities at the controller. The controller manages all the requests generated from distributed switches to get the optimal path for sending data from source to destination using load balancing algorithms. The guarantee of packet reachability is a major challenge in real time scenario of a SDN which depends on components of network infrastructure as switches, a central controller, channel capacity and server load. The success of this aggregation and packet reachability demand is a high Quality of Service (QoS) requirement in terms of throughput, delay and packet loss due to high traffic volume and network size. This QoS has two perspectives one is required other is a computation of real QoS value. Methods: In this paper, we have presented the QoS based formal model of SDN to compute and to investigate the role of the real QoS value. This formal model includes QoS on the basis of packet movement hop by hop which is a real-time QoS. The hop by hop packet movement reliability has been computed using channel capacity and server load which is an abstraction of throughput, delay, and packet loss. The effect of channel capacity and server load can be varying using different values of the weight factor. We have also considered an equal role of channel capacity and server load to compute reliability. This QoS helps to the controller to match with required QoS to decide the better path. Conclusion: Our results finds the reliable path based on channel capacity and server load of the network. Also, results showed that the reliability of the network and controller which are based on the reliability of the packet delivery between two nodes.
-
-
-
Energy Enhancement Techniques for Structure-Free Wireless Sensor Network with Encrypted Data
Authors: Hussain K. Chaiel, Zainab S.M. Al-Husseini and Khaldun I. ArifBackground: Nowadays, in military and border surveillance application, the WSNs become an effective part of the command and control system. This requires an efficient type of cryptography. Due to small size requirement, elliptic curve becomes the most suitable for such purpose. Objective: The encryption operation, in turn, increases the power required to transmit data through the network. The aim of this work is to reduce such power. Methods: This work suggests three methods to reduce the needed power. The first method is based on spread spectrum technology, which reduces the total number of levels in the network. The second method deals with algorithm used to choose the sensing node, while the third method suggests a cost function related directly to the available energy. Results: Computer simulation tests show a reduction in the required energy by 40% when we apply the first method, while the second and third methods together reduce the energy by 12% of the total value of the whole network. Conclusion: The energy required to transmit encrypted data can be reduced with the aid of routing algorithms. These algorithm increase the coverage radius of the node transmission.
-
-
-
Dynamic Sliding Mode Control Based on Fractional Calculus Subject to Uncertain Delay Based Chaotic Pneumatic Robot
Authors: Sara Gholipour, Heydar T. Shandiz, Mobin Alizadeh, Sara Minagar and Javad KazemitabarBackground & Objective: This paper considers the chattering problem of sliding mode control in the presence of delay in robot manipulator causing chaos in such electromechanical systems. Fractional calculus was used in order to produce a novel sliding mode to eliminate chatter. To realize the control of a class of chaotic systems in master-slave configuration, a novel fractional dynamic sliding mode control scheme is presented and examined on the delay based chaotic robot. Also, the stability of the closed-loop system is guaranteed by Lyapunov stability theory. Methods: A control scheme is proposed for reducing the chattering problem in finite time tracking and robust in presence of system matched disturbances. Results: Moreover, delayed robot motions are sorted out for qualitative and quantitative study. Finally, numerical simulations illustrate feasibility of the proposed control method. Conclusion: The control scheme is viable.
-
-
-
Substrate Integrated Waveguide Based Bandpass Filter with Defected Ground Structure for FMCW Radar Application
Authors: Keyur Mahant and Hiren MewadaAims: Substrate Integrated Waveguide (SIW) based bandpass filter is presented in this paper. Objectives: In the proposed design, bandpass response is achieved by combining SIW structure with elliptic shaped Defected Ground Structure (DGS) cells. Methods: Simulation of the proposed structure is carried out using commercial software Ansoft High Frequency Structure Simulator (HFSS), which is a three-dimensional frequency domain electromagnetic solver based on the Finite Element Method (FEM). Analysis of three different types of DGS cells including rectangular, circular and elliptical has been carried out. Moreover, Frequency tuning is also carried out by changing the dimension of DGS. Result: Proposed filter is fabricated on the dielectric material RT duroid 5880 with the dielectric constant εr=2.2, dissipation factor tanδ=4 x 10-4 and height h= 0.508 mm. The measured return loss of 25.71 dB and insertion loss of 1.24 dB with 3 dB Fractional Bandwidth (FBW) of 4.8% at the center frequency of 7 GHz. Conclusion: Good agreements are observed between the experimental results and the simulations.
-
-
-
A Novel Substrate Integrated Waveguide (SIW) Based Highly Selective Filtering Power Divider
Authors: Keyur Mahant and Hiren MewadaAims: In this paper, a novel Substrate Integrated Waveguide (SIW) based filtering power divider is presented. Objectives: In the proposed power divider, filtering response is achieved by interleaving inductive posts in the SIW structure. The proposed structure reduces the size and the cost of the system, as the structure performs the function of the power divider as well as the function of a filter. Methods: Simulation of the proposed structure was carried out using commercial software Ansoft High Frequency Structure Simulator (HFSS), which is a three-dimensional full-wave solver utilizing the Finite Element Method (FEM). The proposed power divider structure was also fabricated and tested. Result: The measured return loss was found to be -21.78 dB with 3 dB Fractional Bandwidth (FBW) of 4.72% at the center frequency of 14.8 GHz. Moreover, the proposed structure showed an insertion loss of 0.96 dB, isolation of more than 18 dB; maximum amplitude and phase imbalance was observed to be 0.18 dB and 1.24° respectively within the operating frequency band. Conclusion: Good agreements are observed between the experimental results and the simulations.
-
Most Read This Month
