{"title":"Multi-class Multipath Routing Protocol for Low Power and Lossy Networks, with Energy Balanced Optimal Rate Assignment","authors":"Maryam Farahbakhsh, Meisam Nesary Moghadam","doi":"10.21203/RS.3.RS-490288/V1","DOIUrl":"https://doi.org/10.21203/RS.3.RS-490288/V1","url":null,"abstract":"\u0000 The wireless sensor networks (WSNs) are special network which has purpose of gathering information in certain area. Multipath routing is the paramount path of addressing QoS and energy balancing concerns in low power and lossy networks (LLNs) especially in IoT technology. Most of the extant efforts bring the limited number of disjoint paths into play, and intersect the traffic among them pursuant to a compound metric or centralized optimization problem. This paper proposes a multi-class multipath routing protocol for LLNs (called M2RPL), that construct a braided multipath routing graph based on the standard RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol, and an energy balanced optimal rate assignment mechanism (EBORA) that solves a local multi class optimization problem for minimum cost traffic rate assignment. Moreover the algorithm tries to maximize network lifetime by equalizing the energy dissipation rates of equi-level nodes. The simulation results expose the efficiency of the proposed framework, leading to an average 15% increase in lifetime, and improved QoS performance in terms of delay and reliability, compared to some well-known algorithms.","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks","authors":"Valarmathi Marudhai, S. Prince, Shayna Kumari","doi":"10.21203/RS.3.RS-455158/V1","DOIUrl":"https://doi.org/10.21203/RS.3.RS-455158/V1","url":null,"abstract":"\u0000 With the latest technological advancements and attractive features of next generation intelligent optical networks such as high bandwidth, low power consumption, and low transmission loss, etc., they have been considered as most viable solution to satisfy promptly growing bandwidth demands. However, main optical network components bring forth a set of security challenges and reliability issues, accompanied by new vulnerabilities within the network. This paper proposes a new design for an optical encryption and decryption method for enhancing optical network security using p-i-n photodiode which generates Pseudo Random Binary Sequence (PRBS) as a shot noise fluctuations and wavelength converter based design using Semiconductor Optical Amplifier (SOA) based XOR gate which utilizes Cross-Phase Modulation (XPM). The system performance based on Bit Error Rate (BER) and Q factor are analyzed at different data rates for different link lengths up to 100 km using OptiSystem. It is observed that error free transmission with a BER of 10-12 is achieved a data rate of 10Gbps for a link length of only 30 Km for the system with PIN photodiode’s shot noise being used for PRBS sequence generation. However, wavelength conversion based system enables transmission of signal at 10Gbps signal up to a link length of 90Km.","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. G. Abdulkadhim, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, A. M. A. Al-muqarm
{"title":"Optimizing the Roadside Unit Deployment Mechanism in VANET with Efficient Protocol to Prevent Data Loss","authors":"F. G. Abdulkadhim, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, A. M. A. Al-muqarm","doi":"10.1007/S11277-021-08410-6","DOIUrl":"https://doi.org/10.1007/S11277-021-08410-6","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lahcen Sellak, L. Aguni, S. Chabaa, S. Ibnyaich, A. Zeroual, A. Baddou
{"title":"Modeling and Designing of a Compact Single Band PIFA Antenna for Wireless Application Using Artificial Neural Network","authors":"Lahcen Sellak, L. Aguni, S. Chabaa, S. Ibnyaich, A. Zeroual, A. Baddou","doi":"10.21203/RS.3.RS-454370/V1","DOIUrl":"https://doi.org/10.21203/RS.3.RS-454370/V1","url":null,"abstract":"In this paper, we are interested to design a compact single band PIFA antenna using the artificial neural networks (ANN) based on the multilayer perceptrons (MLP). The designed antenna will operate at the frequency 2.45 GHz for ISM (Industrial, Scientific and Medical) band, the medical field, the mobile phone,the Wi-Fi and the Bluetooth. The absence of mathematical models that takes into account all the parameters that affect the characteristics of these antennas present a difficulty in the design of this type of antennas. In this paper, our main contribution is the development of a synthesis and analysis model for PIFA antenna based on the artificial neural network method. For this reasons, we have developed a model of the neural network based on the multilayer perceptron to predict the resonance frequency and the bandwidth of a single band PIFA antenna. By applying the same method, we managed to find a multilayer perceptron structure that can accurately predict the dimensions of the PIFA single band antenna. Using the HFSS software, we designed the single band PIFA antenna that can operate at the frequency 2.45 GHz and presents a bandwidth at -10dB equal 1.0552 GHz, a good reflection coefficient ( −51 dB), the gain is 6.5867 dB.","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tu N. Nguyen, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu
{"title":"Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks","authors":"Tu N. Nguyen, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu","doi":"10.1007/S11277-021-08404-4","DOIUrl":"https://doi.org/10.1007/S11277-021-08404-4","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network","authors":"G. Vasukidevi, T. Sethukarasi","doi":"10.1007/S11277-021-08406-2","DOIUrl":"https://doi.org/10.1007/S11277-021-08406-2","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process","authors":"Yafei Wang","doi":"10.1007/S11277-021-08446-8","DOIUrl":"https://doi.org/10.1007/S11277-021-08446-8","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expectation Maximization Method for Effective Detection and Tracking of Object Using Machine Learning Technique for Secure Wireless Communication","authors":"A. Alqahtani","doi":"10.1007/S11277-021-08445-9","DOIUrl":"https://doi.org/10.1007/S11277-021-08445-9","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roy Setiawan, R. Ganga, Priya Velayutham, K. Thangavel, D. Sharma, Regin Rajan, S. Krishnamoorthy, Sudhakar Sengan
{"title":"Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network","authors":"Roy Setiawan, R. Ganga, Priya Velayutham, K. Thangavel, D. Sharma, Regin Rajan, S. Krishnamoorthy, Sudhakar Sengan","doi":"10.1007/S11277-021-08403-5","DOIUrl":"https://doi.org/10.1007/S11277-021-08403-5","url":null,"abstract":"","PeriodicalId":156550,"journal":{"name":"Wirel. Pers. Commun.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}