Tuesday, 22 July 2014

Detecting Misbehavior In Wi-Fi Networks Aware Neighbour Coverage

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : Detecting Misbehavior In Wi-Fi Networks Aware Neighbour Coverage

Author Name : Sathiya Sindu, J. REEGAN , SATHIYA NAVEENA

Synopsis :

Wi-Fi has been widely deployed in enterprise and campus networks. With this wide deployment, it becomes increasingly important to understand the behavior of Wi-Fi interference and automatically managed Wi-Fi to ensure their normal operation and security. Selfish Carrier Monitoring (SCM) approach is used to detect a selfish attack of a Wi-Fi network by sniffer monitoring. Wi-Fi performance is analyzed by sniffers that capture transmitted frames. Multiple sniffers are deployed to monitor the selfish carrier sense behavior by initiating the threshold value with. Multiple sniffers in large areas, some areas are covered with more than one sniffer, and neighbour sniffers will observe the information about coverage areas. A node can be selfish by raising the Clear Channel Assessment (CCA) threshold value. Based on the identifications any misbehavior in carrier sense behavior with in the node pairs, and the selfish attack by tuning the threshold value are found. By detecting attacker nodes in the network, and sniffer broadcasting the information to the neighbour, in an isolate the attacker and choose alternate path for broadcasting. Distributed sniffers efficiently detect and isolate attacker in routing path. Selfish attack activates the sniffer monitoring system even when the network is in active state or inactive state depending on the suspicious value. Obtaining more accurate additional coverage area ratio of sensing neighbour coverage knowledge will also minimize router overhead.



For more details:





Efficient Schemes To Wireless Sensor Networks (WSN) For Improving Lifetime

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : Efficient Schemes To Wireless Sensor Networks (WSN) For Improving Lifetime

Author Name : S. Anandamurugan

Synopsis :

The utilization of Wireless Sensor Networks (WSNs) to a full extent is limited by the limited energy constraints of the individual sensor nodes. Large part of the research in WSNs focus on the development of energy efficient routing protocols. Energy usage is the determining factor in the performance of WSNs. Both the methods of data routing and transferring to the base station are very important because the sensor nodes run on battery power and the energy availability for each sensor node is limited. To maximize the lifetime of the sensor node, it is better to share the energy dissipated throughout the sensor network in order to reduce maintenance and enhance the overall system performance. The proposed Cluster based approach is combined with Ladder Diffusion (LD) and Ant Colony Optimization (ACO) to reduce the power consumption and to solve transmission routing problems in wireless sensor networks. The LD algorithm is employed to route paths for data relay and transmission in wireless sensor networks and it reduces power consumption and processing time to build the routing table. Moreover, to ensure the safety and reliability of data transmission, LD-ACO algorithm[5] provides backup routes to avoid wasted power and processing time when rebuilding the routing table in case part of sensor nodes are missing.



For more details:




Efficiency of Proactive and Reactive Routing Protocols in VANET

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : Efficiency of Proactive and Reactive Routing Protocols in VANET

Author Name : Awantika, ASHOK KUMAR , Hardwari Lal Mandoria

Synopsis :

Vehicular Ad-hoc Network (VANET) is an emerging area of interest in road security. It is a sub network of Mobile Ad-hoc Network (MANET). It is specially designed to provide road security by establishing Vehicle-to-Vehicle (V2V) communication and Vehicle-to-Infrastructure (V2I) communication. Moving vehicles act as mobile nodes in VANET. As VANET is a new area, it is important to decide the best suitable protocol that matches with its rapid topology changes. This paper presents the study of Proactive and Reactive routing protocols in VANET on different parameters like Packet Delivery Ratio, End-to-End Delay and Throughput. On the basis of the above mentioned parameters efficiency of protocol is calculated.



For more details:






Performance Analysis Of LEACH Protocol For Wireless Sensor Network

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : Performance Analysis Of LEACH Protocol For Wireless Sensor Network

Author Name : mohit mungali, Rajesh Singh , Hardwari Lal Mandoria

Synopsis :

Wireless Sensor Networks (WSNs) is a collection of sensing devices that can communicate wirelessly where each device can sense, gather and deliver or process the data to its peers. WSNs is an “exciting emerging domain of deeply networked systems of low-power wireless motes with a tiny amount of CPU and memory, and large federated networks for high-resolution sensing of the environment”. As generally sensor nodes work with battery powered devices, so the main emphasis is how to reduce the energy consumption of nodes, so that the lifetime of network can be increased. There are several energy efficient hierarchical routing protocols. Amongst these, the authors have simulated LEACH in NS2 with MANNASIM framework and analyzed the performance of LEACH(Low Energy Adaptive Clustering Hierarchy) in terms of alive nodes, frames, bits from cluster.



For more details:





Parametric Design and Simulations of Double L-slot Microstrip Patch Antenna Array for WiMAX andWLAN applications

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : Parametric Design and Simulations of Double L-slot Microstrip Patch Antenna Array for WiMAX andWLAN applications

Author Name : Ashvini Chothe, Shamala Mahadik

Synopsis :

Microstrip antennas are becoming more popular due to their extraordinary properties like low profile, light weight, low cost, conformance to planar and non-planar surfaces, simplicity and inexpensive manufacturability. Microstrip patch antenna has tremendous scope in WLAN and WiMAX applications due to their low profile platform design. In this paper, a double L-slot microstrip patch antenna array with the Coplanar Waveguide (CPW) Feed has been presented for WLAN (Wireless Local Area Network) and WiMAX (Worldwide Interoperability for Microwave Access) by operating frequencies. The results of simulation show that employing two different slots, a good bandwidth and a perfect impedance match can be obtained. This design results reduce the size, weight and allows easy integration in hand-held devices.



For more details:





LECSA - A New Scheduling Approach For Radiation Monitoring WSN

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : LECSA - A New Scheduling Approach For Radiation Monitoring WSN

Author Name : Rathna, A.Sivasubramanian , T.Sasipraba

Synopsis :

Sensor networks have recently emerged as a platform for several important surveillance and control applications. Sensor nodes are typically less mobile, more limited in capabilities, and more densely deployed than Mobile Ad-hoc Networks (MANETs). Clustering the sensor nodes will reduce the energy wastage to some extent. First, it is considered that the arrangement of clusters is depending upon the intensity of data in a particular area. This selection of clusters is decided at the real – time deployment phase, and our simulation work considers it on a 2 – D spatial domain. Second, each cluster has an interconnected data exchange procedure which makes use of cluster head selection and consequently, each node transfers its information to the cluster head. The energy of each wireless node should be conserved and minimum utilization during the collection and transfer of data should be achieved. Keeping this as objective, a moderately energy efficient TDMA (Time Division Multiple Access) based scheduling algorithm called as Load and Energy Consumption based Scheduling Algorithm (LECSA) has been developed and implemented in the simulation.



For more details:





A Review on Optimal Node Placement Methods in Wireless Mesh Network Planning

Vol.3  No.1

Year : 2014

Issue : Apr-Jun

Title : A Review on Optimal Node Placement Methods in Wireless Mesh Network Planning

Author Name : Merlin Sheeba, Dr.ALAMELU NACHIAPPAN

Synopsis :

Wireless Local Area Network (WLAN) technology has matured to provide more efficient and flexible solution, through the wireless network anywhere on campus for internet access with less investment. WLAN mesh networks consist of Mesh Routers, Mesh Access Points (MAP), Mesh Gateways/Mesh Point Portal. Planning a network by minimizing the number of devices with better connectivity and coverage for cost effectiveness is a challenging issue. The gateway nodes in WMNs operate as integration points between the multi-hop wireless network and the wired network. Appropriate placement of such integration points is a critical factor in achievable system capacity.


For more details:






Monday, 7 July 2014

Performance analysis of Broadcast Data Dissemination over VANETs

Vol.2  No.4

Year : 2014

Issue : Jan-Mar

Title : Performance analysis of Broadcast Data Dissemination over VANETs

Author Name : Mary Valantina, S. Jayashri

Synopsis :

VANETs (Vehicular Ad-hoc Networks) are new emerging and challenging technology that makes an improvisation in traffic safety and efficiency. The constant growth of the automobile industry is increasing the demand for car safety and the car to car connectivity. It creates a path for Intelligent Transportation System(ITS).The information that is carried by the vehicles can enrol safety measures The group-oriented services are one of the primary application classes that are addressed by VANETs in the recent years. The challenges in VANET are, designing appropriate routing protocols suitable to the traffic model, ensuring proper delivery of emergency messages, security of the data and, avoiding the collision of messages, avoiding flooding of messages, etc. To support such services, broadcasting protocols are used. In this article, the authors review communication routing protocols for broadcasting and mechanisms that alleviate the broadcast storm problem. Moreover the authors analyze the network design considerations in architecture and protocol development, classify and characterize these routing protocols, and conclude with open the issues in disseminating messages for vehicular communication networks.



For more details:

Robust Multiuser Detection Using Blind Methods in Different Wireless Channels

Vol.2  No.4

Year : 2014

Issue : Jan-Mar

Title : Robust Multiuser Detection Using Blind Methods in Different Wireless Channels

Author Name : Guntu Nooka Raju, B. Prabhakara Rao

Synopsis :

In this article, the implementations of the Minimum Mean Squared Error (MMSE) and Blind method are studied with respect to their error performance. The main object of this article is a MMSE based adaptive approach, and on the other hand, a blind adaptive approach. The studies of both the schemes are done in a Multiuser detection environment. The multiuser detection environment model takes into account the receiver’s noise model and Multi-Access Interference (MAI) from other users. The first approach does not require any prior knowledge but calls for a training sequence. The second approach does not require any training sequence but requires exact knowledge of the signature sequences of the users and also takes longer to converge. The Bit Error Rates (BER) of both the approaches are given to compare the performance. The results show that Blind method outperforms MMSE at the edge of the cell for low SNRs and approaches similar to MMSE at high SNRs but suffers with a long time of convergence.



For more details:

FPGA Realisation Of An Optimal Reed Solomon Encoder

Vol.2  No.4

Year : 2014

Issue : Jan-Mar

Title : FPGA Realisation Of An Optimal Reed Solomon Encoder

Author Name : Ratna kamala, R.V.S.Satyanarayana

Synopsis :

The demands of achieving data integrity during transmission through coding over a wireless network have continued over time due to the high volume of data exchanged. This paper proposes an implementation of Reed Solomon code which is one of the Linear block codes that has been found to be optimal for reliable data transmission with its optimum parameters as n=255 and K=223. This optimum Reed Solomon encoder /decoder, RS(255,223) is implemented with Verilog description for Encoder and VHDL description for Decoder. This paper emphasizes on FPGA (Field Programable Gate Array) prototyping of the RS (255,223) encoder with less utilization of Hardware resources.



For more details:

Curtail Idle Listening without Losing the Network Connectivity

Vol.2  No.4

Year : 2014

Issue : Jan-Mar

Title : Curtail Idle Listening without Losing the Network Connectivity

Author Name : jyothi preshiya, C.D Suriyakala

Synopsis :

Extensive research efforts have been put to facilitate distraction free communication in intermittently connected Networks. Nodes within this kind of network experience frequent disconnections due to sparse deployment of nodes, mobility and node failures. Usually, nodes in an intermittent network spend more time in listening to the network rather than transmitting or receiving any useful data. Problem: The energy consumed by idle listening mode is one of the major reasons for battery drain which is the main problem in intermittent network. The solution is that the Design of a new structure for Beacon Interval with one Beacon Frame and checking out the neighbor table for the past record of encounters so as to decrease idle listening without losing network connectivity in the intermittent network. The actual performance of the proposed work is analyzed using the parameters Packet delivery ratio, energy consumption and neighbor discovery in order to check the condition “sleep more without losing the network connectivity” is achieved.



For more details:

A Novel Approach Using Mobility & Data Aggregation for Sensor Networks during Emergency Conditions

Vol.2  No.4

Year : 2014

Issue : Jan-Mar

Title : A Novel Approach Using Mobility & Data Aggregation for Sensor Networks during Emergency Conditions

Author Name : kiruthika srinivasan

Synopsis :

Wireless sensor networks are expected to find wide applicability and increasing deployment in the near future. It consists of spatially distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network to a main location. More modern networks are bi-directional, also enabling the control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance, many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The operation of WSN is normal under ordinary condition. But in case of an emergency situation, like fire break out one of the nodes deployed in the area may get ruined. Under such circumstances, the data collected around the vicinity of the node may be lost. Such kind of situations results in severe packet drop and thus decreases the communication throughput in Medium Access Control (MAC) protocols. Hence data aggregation and mobility has been put forward as an essential paradigm. In this paper, the authors propose an alternative mechanism for node failure and a recovery scheme for the vast packet drop problem. Here reference point group mobility model has been used for replacing the damaged node and the aftermath performances are analyzed for various radio propagation models. The simulation is carried out by means of NS2 (Network Simulator).



For more details:

Devotees Tracking Using GPS and ISP

Vol.2  No.3

Year : 2013

Issue : Oct-Dec

Title : Devotees Tracking Using GPS and ISP

Author Name : S.SUDHA, L.GOWTHAMI

Synopsis :

Every day, lakhs of devotees gather in Tirupathi.. Tracking the movement of such a large number of people is crucial to the devotees them-selves and the authorities managing the whole event. This letter reports a real-time devotee tracking system that has been designed and implemented. The system relies on a dedicated delay-tolerant wireless sensor network (WSN). This WSN is interfaced to the Internet through gateway(s) available from an internet service provider (ISP) . Energy efficiency, robustness, and reliability are key factors in the design of the system. Each devotee is given a mobile sensor unit which includes a GPS chip, a microcontroller, and antennas. A network of fixed units is installed in the Holy area for receiving and forwarding data. Periodically, each mobile unit sends its user identification (UID), latitude, longitude, and a time stamp. A central server maps the latitude and longitude information on a geographical information system (GIS). The developed system can be used to track a specific or a group of devotees.



For more details:

Survey of Adaptive scheme for QoS in Wireless Sensor Networks

Vol.2  No.3

Year : 2013

Issue : Oct-Dec

Title : Survey of Adaptive scheme for QoS in Wireless Sensor Networks

Author Name : R. SIVARANJINI, sakthisudhan karuppanan

Synopsis :

Accurate data extraction is difficult; it is often too costly to obtain all sensor readings, as well as not necessary in the sense that the readings themselves only represent samples of the true state of the world. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor data collection and to achieve network energy efficiency and stability. So as we propose an adaptive scheme to control power-aware data collection in wireless sensor networks by integrating adaptively enabling/disabling prediction scheme. Our framework is clustering based. A cluster head represents all sensor nodes in the cluster and collects data values from them. Our framework is general enough to incorporate many advanced features and we show how sleep/awake scheduling can be applied, which takes our framework approach to designing a practical algorithm for data aggregation: it avoids the need for rampant node-to-node propagation of aggregates, but rather it uses faster and more efficient cluster-to-cluster propagation. To the best of our knowledge, this is the first work adaptively enabling/disabling prediction scheme for clustering-based continuous data collection in sensor networks. When a cluster node fails because of energy depletion we need to choose alternative cluster for that particular region. Our proposed models, analysis, and framework are validated via simulation and comparison with competing techniques in order to achieve better energy efficiency and QoS.



For more details:

Cooperative Spectrum Sharing Protocol with Selective Relay System in Cognitive Radio Network

Vol.2  No.3

Year : 2013

Issue : Oct-Dec

Title : Cooperative Spectrum Sharing Protocol with Selective Relay System in Cognitive Radio Network

Author Name : N.Elayabharathi, M.Poonguzhali , B.PRADEEP RAJA , K.YALINI

Synopsis :

Cognitive Radio Network (CRN) and Cooperative Communication provides a new environment in wireless network which can effectively improve the spectrum efficiency of future wireless network. In this paper, a two phase protocol based cooperative relaying for a secondary user along with decode-and-forward (DF) and amplify-and-forward (AF) relaying system is proposed. In the proposed protocol, a dynamic queuing algorithm is used to access and manage the spectrum from a Primary User (PU) to the Secondary Users (SU) without any conflicts between the cognitive users (CR) or Secondary Users (SU) for accessing the same available spectrum. A Multi Behaviour Node System (MBNS) is used to achieve better outage performance for the secondary system when it fails from a relay selection. The proposed scheme achieves the effective spectrum sharing and hence the overall system performance is improved. The simulation result shows the improvement over DF and AF relaying system.




For more details:

Mobile- Microcontroller Based Wireless Communication For The Control Of Appliances Integrated With Their Automation

Vol.2  No.3

Year : 2013

Issue : Oct-Dec

Title : Mobile- Microcontroller Based Wireless Communication For The Control Of Appliances Integrated With Their Automation

Author Name : K.V.N. Kavitha, Shashank Chaurasia

Synopsis :

System designed here is for automation of home appliances using Dual Tone Multi Frequency (DTMF) technology. This also aims at providing an interfered and continuous control over many household devices. The user module has many buttons, each referring to the device that needs activation. An encoder (i.e. the transmitter phone) encodes the required information and transmits with the help of a FM transmitter. The FM receiver (i.e. receiver phone) receives the modulated signal and demodulates it using a demodulator and the required information is determined by the DTMF decoder. Following this method the required action is achieved. Such a system is very useful in this busy modern world, where everything is being sought for automation. Also included here, is a microcontroller based counter to count the number of people in a room and accordingly alter the lighting arrangements in the room. This satisfies the continuous need for automation of appliances in today’s tech-savvy world. Also this circuit proves to be of great help if one wants to know the number of people present in a room in order to avoid congestion.



For more details:

Analysing the Effect of Cluster Strategies in Multicast Traffic using TAM Protocol for Ad-hoc Networks

Vol.2  No.3

Year : 2013

Issue : Oct-Dec

Title : Analysing the Effect of Cluster Strategies in Multicast Traffic using TAM Protocol for Ad-hoc Networks

Author Name : DEEPAKRAJ S, THAMILSELVAN

Synopsis :

Ad-hoc networks generally play a vital role in emerging technologies. The limited communication and computation resources, the unguaranteed connectivity to trusted authorities make known security solutions for wired networks. A novel Tiered Authentication scheme for Multicast traffic (TAM) has large scale of ad-hoc networks. Nodes are grouped into the cluster. Cross-cluster multicast traffic includes a Message Authentication Code (MAC) that is based on set of keys. Each cluster uses unique subset of keys. TAM is combination of secret information asymmetry and the time information asymmetry for inter cluster and intra cluster networks. The topologies used are flat, spanning tree, balanced tree to reduce bandwidth overhead and delivery delay. These topologies are compared for numerical and analytical results that demonstrate the advantage of TAM.



For more details:

Saturday, 5 July 2014

Microcontroller Based Non Invasive Wireless Sensor Network to Monitor Health of Diesel Generator (DG) Sets

Vol.2  No.2

Year : 2013

Issue : Jul-Sep

Title : Microcontroller Based Non Invasive Wireless Sensor Network to Monitor Health of Diesel Generator (DG) Sets

Author Name : C S Kudarihal, Prashant Menghal

Synopsis :

Kudarihal and his co-author Menghal study the aspects of maintaining equipments in remote areas with timely and accurate prediction of failures. For a comprehensive health monitoring of DG (Diesel Generator) Set, the microcontroller based wireless sensor network system has been developed. The ATMEL AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications and provide interface with main circuits and various feedback signals.It is accurate, relatively inexpensive and easy to use.



For more details:

Reform the tag Anti-collision protocols in RFID

Vol.2  No.2

Year : 2013

Issue : Jul-Sep

Title : Reform the tag Anti-collision protocols in RFID

Author Name : Milad HajMirzaei

Synopsis :

Milad Hajmirzaei proposes an efficient algorithm called IMAS (Improved Multi slotted scheme with Assigned Slots) algorithm which overcomes the problem caused by Tag collision. During the transmission of information from one reader, the collision occurs when more than one tag transmit its ID to reader simultaneously. When more than one tag with a same prefix respond in a slot, the collision will be detected by reader. More than 200 tags are used for experiment and the collision is less IMAS.



For more details:

Efficient data search in partially structured peer-to-peer network using aggregate queries and replication of database at certain nodes in the network.

Vol.2  No.2

Year : 2013

Issue : Jul-Sep

Title : Efficient data search in partially structured peer-to-peer network using aggregate queries and replication of database at certain nodes in the network.

Author Name : sweta arya

Synopsis :

Sweta Arya presents a novel method to find out the desired file in a partially structured local peer-to-peer network to authenticate each entry of data which are accessed by the user for future. A technique is evaluated to increasing the efficiency of search scheme by replicating the database at certain selected nodes which increase the availability of data. Data is replicated at the query node and become available for future transaction between peers. The application is designed with ASP.net in frontend and SQL server as backend. Speed of transfer of data is also improved due to efficient structuring in the database of system.



For more details:

Location Evaluation on various ambience based on RSSI Localization Algorithms in WSNs

Vol.2  No.2

Year : 2013

Issue : Jul-Sep

Title : Location Evaluation on various ambience based on RSSI Localization Algorithms in WSNs

Author Name : mary livinsa, S. Jayashri

Synopsis :

Z.Mary Livinsa and S.Jayashri deliberate a Received Signal Strength Indicator(RSSI) to estimate the distance between two sensor nodes in a WSNs that ingests the built in RSSI circuit board inside the sensor’s transceivers chipsets. AmicaZ platform is used which is based on the radio chip CC2420 that operates in 2.4GHZ band using an effective data rate of 256Kbps.The experiment repeated for 100 times and the error range is an average of 2.034m.



For more details:

New-fangled Deterministic Interleaver with Peak Correlation Analysis for OFDM-IDMA System

Vol.2  No.2

Year : 2013

Issue : Jul-Sep

Title : New-fangled Deterministic Interleaver with Peak Correlation Analysis for OFDM-IDMA System

Author Name : Mary Juliet, S. Jayashri

Synopsis :

Mary Juliet and her co-author Jayashriproposea new methodology to determinineinterleaveralong with its correlation analysis. They also analyze the Multiple Access Interference (MAI) performance of new interleavers using peak correlation analysis. Collision probability of an interleaver is achieved by performing correlation analysis. In OFDM-IDMA, IDMA (Interleave Division Multiple Access) is a novel technology that replaces the drawbacks of existing Code Division Multiple Access (CDMA) technique. The clockwise interleaver has a user specific cross correlation 0.27 which is nearly zero. This indicates that the collision between two interleavers is nearly zero.




For more details: