M. Abdelhafidh, M. Fourati, L. Chaari, Abdessalam Chouaya
{"title":"Wireless sensor network monitoring system: architecture, applications and future directions","authors":"M. Abdelhafidh, M. Fourati, L. Chaari, Abdessalam Chouaya","doi":"10.1504/ijcnds.2019.10024114","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024114","url":null,"abstract":"Wireless sensor network monitoring systems (WSNMS) have emerged as one of the most promising research area due to reliable technology progress related to the deployed sensors. This solution is efficiently involved with advanced technologies such as internet of things (IoT) and physical cyber system (CPS) that are designed as a bridge connecting the real world to the digital world. This survey gives a holistic view of WSNMS based on a recent state of the art. We address WSNMS applications and its challenges to facilitate its deployment in real world. We demonstrate the synergy between WSN and the information and communication technologies (ICT) and its major specifications. Finally, we depict open research issues that need to be more studied in the future. We expect to help researchers to get basic knowledge on WSNMS and to open for them new opportunities in regards to understand new technologies considered as an evolution of WSN.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and performance evaluation over Nakagami-m/log-normal fading environments","authors":"P. K. Verma, S. Soni, P. Jain","doi":"10.1504/ijcnds.2019.10024113","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024113","url":null,"abstract":"In this paper, we present the closed-form expressions of composite Nakagami-m/log-normal (NL) fading channel by Holtzman approximation. The obtained expressions are used to derive the important performance parameters of wireless communications systems. These performance matrices are amount of fading (AF), outage probability (PO), average channel capacity (CC) and average symbol error probability (ASEP) of coherent modulation comprising binary orthogonal, antipodal, M-ary phase shift keying (M-PSK) and M-ary pulse amplitude modulation (M-PAM). Furthermore, energy detection (ED) is one of the ways to determine whether the signal is present or not. The performance of ED is studied in terms of complementary receiver operating characteristics (CROC) curve. To verify the correctness of our analysis, the derived closed-form expressions are corroborated via exact result and Monte Carlo simulations.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes","authors":"C. P. Kumar, R. Selvakumar","doi":"10.1504/ijcnds.2019.10024116","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024116","url":null,"abstract":"Cognitive radio networks have emerged as a promising solution for spectrum scarcity problem. Secondary users (unlicensed users) accessing cognitive radio network suffer from continuous unintentional interference from primary users (licensed users). Also, the adversary present in the channel tries to thwart the secondary users' communication. To address these two problems, an inherent authentication protocol is defined over Reed-Solomon codes. Reed-Solomon codes with authentication protocol are used with M-ary frequency shift keying modulation technique, for transmissions over cognitive radio network. Similarly, the received message is demodulated and decoded to get the original information bits at the receiver. The performance of the proposed scheme is given in terms of bit error rate. The experimental results show that the proposed system performs better in terms of BER reduction. Also, it is shown that the proposed scheme is resistant to replay attack, man-in-the-middle and impersonation kind of attacks.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of service class mapping and scheduling scheme for converged LTE-WiFi in the next generation networks","authors":"Amer T. Saeed, A. Esmailpour","doi":"10.1504/IJCNDS.2019.10022367","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022367","url":null,"abstract":"In this paper, a novel quality of service (QoS) class mapping and scheduling scheme for the LTE-WiFi converged network is proposed to ensure that end-to-end QoS support is provisioned seamlessly. A mapping among QoS classes of LTE and WiFi is performed first, then scheduling scheme is outlined. For scheduling scheme, traffic is separated into real-time (RT) and non-real-time (NRT) components, then a two-stage complex queuing strategy is performed. In the first stage, deficit weighted round robin queuing (DWRRQ) and class-based weighted fair queuing (CBWFQ) are used for RT and NRT applications respectively to segregate and forward traffic according to resource requirements. Whereas in the second stage, rate-control priority queuing (RCPQ) is used for all types of traffic to give each class appropriate priority level. Performance evaluation of the converged network was done based on different metrics such as jitter, end-to-end delay, throughput, and packet loss ratio. Simulation results show significant improvements for RT with slight degradation on NRT applications after using the new scheduling scheme.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Williams-Paul Nwadiugwu, Dong‐Seong Kim, Jae-Min Lee
{"title":"Energy-efficient real-time deployment of mobile sensors in disaster-prone location","authors":"Williams-Paul Nwadiugwu, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1504/IJCNDS.2019.10015202","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10015202","url":null,"abstract":"Recent research works on real-time robot-assisted mobile sensor deployment have become rapid, as they tend to accomplish problem-solving tasks at both safe location and unsafe location. This paper proposes a technique to achieve a real-time energy-efficient deployment of mobile sensors in a disaster-prone location using a path-tracking algorithm. An enhanced path-tracking algorithm was introduced to be able to deploy mobile sensors in both presence and absence of obstacles. The simulation result investigates the real-time performances of the mobile sensor nodes deployment with respect to factors such as the minimal energy consumption of the nodes with neighbourhood sharing scheme, the end-to-end system threshold and the time variance for the deployed sensor nodes to reach the target location and back to the base station.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"129 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed denial of service attacks detection in cloud computing using extreme learning machine","authors":"Gopal Singh Kushwah, Syed Taqi Ali","doi":"10.1504/IJCNDS.2019.10022365","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022365","url":null,"abstract":"Cloud computing has become popular due to its on-demand, pay-as-you-use and ubiquitous features. This technology suffers from various security risks. Distributed denial of service (DDoS) attack is one of these security risks. It is used to disrupt the services provided by cloud computing. In DDoS attack, the cloud server is overwhelmed with fake requests by the attacker. This makes long response time for legitimate users or shut down of the service completely. In this work, a DDoS attack detection model based on extreme learning machine (ELM) has been proposed. Experiments show that proposed model can be trained in a very short period of time and provides high detection accuracy.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122556857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firefly algorithm inspired energy aware clustering protocol for wireless sensor network","authors":"A. Bongale, C. R. Nirmala","doi":"10.1504/IJCNDS.2019.10022366","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022366","url":null,"abstract":"Most of the existing cluster-based routing protocols focus either on cluster head election schemes or on refinement of routing process ignoring process of cluster formation. In this paper, firefly algorithm inspired energy aware clustering protocol for WSN is presented. The idea of the proposed protocol is to elect the cluster head nodes by assigning them intensity value defined through firefly algorithm. Another contribution of this paper is energy efficient cluster formation where cluster members join to cluster heads based on intensity parameter associated with cluster head. The presented protocol ensures that the elected cluster heads are usually located in densely populated area of the network resulting in low distance intra-cluster data transmissions and ultimately leading to low energy consumption. The firefly-based protocol is compared with popular routing protocols such as LEACH, LEACH-C and EOICHD and comparative results indicate that proposed protocol is highly energy efficient than other protocols.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limits of the OFDM use in the radio mobile context","authors":"F. Boumediene, M. Tayebi, M. Bouziani","doi":"10.1504/IJCNDS.2019.10022363","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022363","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is very vulnerable to the carrier frequency offset (CFO) generated mainly by the Doppler effect. The inter-carrier interference (ICI) generated by this offset degrades the system performances. Before stabilising its speed, a mobile must pass through a startup phase where the speed varies gradually in time. The same thing happens during a braking; the speed varies up to a zero value. In this paper, we investigate the effect induced by these speed variations on the OFDM system performances. The weight and the speed of the degradations are taken into account for further enhancement of the performances. The limits of the OFDM modulation are depicted in the line-of-sight (LOS) path where a mobile is subject to different types of accelerations. Simulation results show clearly the sensitivity of OFDM when mobile is subject to higher values of acceleration.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and performance analysis of energy detector-based spectrum sensing with maximum ratio combining over Nakagami-m/log-normal fading channels","authors":"P. K. Verma, Rahul Kumar","doi":"10.1504/IJCNDS.2019.10022364","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022364","url":null,"abstract":"Spectrum sensing (SS) is one of the crucial functions of cognitive radio networks (CRNs). It decides whether the band or sub-band of the spectrum is available or not for secondary users (SUs). Energy detection (ED) is one of the very fundamental approaches of SS to detect whether primary users (PUs) are present or absent. It is mathematically intractable to derive closed-form expressions of composite multipath/shadowing for average probability of detection and average area under the receiver operating characteristic curve. In this paper, we have considered Nakagami-m/log-normal as composite fading with maximum ratio combining (MRC) diversity, and it is approximated by Gaussian-Hermite integration (G-HI). In addition, adaptive threshold or optimised threshold has been incorporated to overcome the problem of spectrum sensing at low signal-to-noise ratio (SNR). To verify the correctness of exact results and obtained analytical expression is collaborated with Monte Carlo simulations.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on spectrum allocation in cognitive radio network","authors":"Wangjam Niranjan Singh, N. Marchang","doi":"10.1504/IJCNDS.2019.10014474","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10014474","url":null,"abstract":"Cognitive radio is a recent technology that enhances the usage of spectrum resources. Efficient assignment of unused spectrum to unlicensed users is an important problem. Spectrum allocation is an important mechanism that limits and avoids the interference between cognitive radio devices and licensed primary users, thus enabling a better efficient usage of the wireless radio spectrum. In this paper, we present a study of different approaches and techniques w.r.t. spectrum allocation in cognitive radio network. We not only compare them in terms of the assignment scheme, execution model, etc. but also highlight their contributions and shortcomings. Additionally, we also highlight the security attacks on spectrum allocation. The challenges that a CR spectrum allocation technique should take into consideration are also discussed in the end with the hope of aiding future research.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}