{"title":"Review of energy efficient routing algorithm as LPP in wireless sensor network","authors":"S. Jain, P. Kaushik, J. Singha","doi":"10.1109/ETNCC.2011.6255912","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255912","url":null,"abstract":"In wireless sensor network most of the devices operate on batteries. These devices or nodes have limited amount of initial energy that are consumed at different rates, depending on the power level and intended receiver. In this paper different type of energy efficient routing algorithms are discussed and approach of these algorithms provide the maximum system lifetime. Most of the algorithms formulate the routing problem as a linear programming problem, which uses the optimal flow path for data transmission and gives the optimum results. These algorithms help to minimize the consumption of large battery power as well as increase the overall lifetime of the network. Advantages, limitations as well as comparative study of these algorithms are also discussed in this paper.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of misbehaviour detection and avoidance scheme in ad hoc network","authors":"R. Raghuvanshi, R. Kaushik, J. Singhai","doi":"10.1109/ETNCC.2011.6255909","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255909","url":null,"abstract":"Misbehaving of nodes in ad hoc network is a more sophisticated problem in recent research area. Therefore, detecting misbehavior has been an arduous task for researchers since last few years. Misbehavior node can be selfish or malicious which degrade or disrupt the performance of network upto a great extent. For this, different types of mechanism have already been proposed. In this paper, different mechanisms for detection and prevention of misbehavior node are discussed in detail. This paper contributes in understanding of most appropriate defense mechanisms by providing a comprehensive comparison between them, based on the type of misbehavior they solve. These mechanisms can be integrated into existing or future work to make them resilient to misbehaving nodes. Also, a check list provides a guideline to identify the pros and cons of respected approaches, so that appropriate parameters can be adjusted to enhance network performance.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122363388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust two-way locking protocol for key exchange","authors":"S. Shetty, S. Hegde","doi":"10.1109/ETNCC.2011.6255883","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255883","url":null,"abstract":"Sharing of symmetric key between the sender and receiver for encryption and decryption is considered to be one of the major issues in the communication networks. It is due to the fact that the strength of cryptosystem depends not only on the strength of the key, but also on the underlying key exchange protocol. In this paper, we propose a Robust Two-way Locking Protocol which overcomes the drawback of Diffie-Hellman key exchange protocol in terms of flexibility provided to the sender for selecting the desired key. Moreover we demonstrate the applicability of the proposed protocol in TCP handshake and compare it with Secure TCP which is based on Diffie-Hellman (DH) key exchange protocol. Based on the simulation results it is observed that Robust Two-way Locking (RoToLo) Protocol incurs negligible overhead in the network while providing greater flexibility of key selection to the sender as compared to Secure TCP.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eradication of funneling effect in wireless communication using TDMA based MAC","authors":"R. Gaur, S. Kumar, D. Gaur","doi":"10.1109/ETNCC.2011.6255888","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255888","url":null,"abstract":"With the rapid development of wireless communication technologies, the idea to use wireless technology in industrial plant floor is striking and the benefits are manifold [1]. The many to-one and hop-by-hop network makes the aperture a barrier and causes a kind of clogging called funnelling effect near the aperture and thus influence real-time and consistency. In this paper, we first present an industrial wireless communication protocol for factory automation systems based on IEEE802.15.4. We present a transmitting rate control technique that takes the fairness issue into consideration for many-to-one routing to reduce the conduit effect. Funnelling-MAC is based on network-wide CSMA and localized, sink-oriented TDMA to mitigate funnelling effect [8]. We introduce a priority based service differentiation and adaptive TDMA time slot scheduling mechanism to solve the clogging in the aperture [9]. The analysis shows this technique eradicates the funnelling effect, improve the communication performance and satisfy the requirements of the industrial Applications.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Patpatia, N. Arora, B. P. Singh, K. Mehta, N. Swami
{"title":"An adiabatic single phase N-type and P-type CPAL technique for full adder design","authors":"B. Patpatia, N. Arora, B. P. Singh, K. Mehta, N. Swami","doi":"10.1109/ETNCC.2011.6255895","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255895","url":null,"abstract":"This paper presents new design techniques for adiabatic full adder cell. Adiabatic logic is the most efficient energy saving technique which provides very low power dissipation in VLSI circuits. Adiabatic Full adder is simulated by using different adiabatic techniques. Simulation results show that energy loss of adiabatic circuits can be greatly reduced by using Complementary Pass Transistor Adiabatic Logic technique. All the circuits have been simulated on BSIM3V3 90nm technology on tanner EDA tool.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing trust policies for cloud: A case study","authors":"Aradhana, Inderveer Chana","doi":"10.1109/ETNCC.2011.6255920","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255920","url":null,"abstract":"Identity provisioning is one of the major concerns in cloud security. Traditionally users were authenticated on the mere basis of static agreement made between the two principals like SLA. However cloud scenarios require dynamic trust management to allow user to access services. This paper describes trust policies that can help in better decision making regarding whom to trust. The implementation of the trust policies has been demonstrated through a case study.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121098011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Soni, K. Vasudevan, P. S. Chauhan, Yashu Shanker
{"title":"Turbo decoding in ISI channels","authors":"S. Soni, K. Vasudevan, P. S. Chauhan, Yashu Shanker","doi":"10.1109/ETNCC.2011.5958495","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958495","url":null,"abstract":"Turbo codes are family of forward error correcting codes, whose performance is near Shannon limit. Turbo decoding is based on the maximum a-posterior algorithm (MAP) algorithm. In this paper, the problem of turbo decoding in ISI channel is studied. A Super-trellis structure method has been presented and modified turbo decoding is suggested. Two methods have been suggested for turbo decoding in ISI channel. In the first method, we take all possible combinations of output of encoder-2 and in method-2, output of each encoder is passed through channel filter independently. Method-2 performs better than method-1 but requires higher bandwidth. The improvement in performance is demonstrated through simulations.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart metering and home automation solutions for the next decade","authors":"Shafik Ahmad","doi":"10.1109/ETNCC.2011.5958516","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958516","url":null,"abstract":"This paper emphasizes the use of the smart metering and home automation technologies for efficient utilization of energy, thus paving the way for a cleaner and greener environment for future generations. Next decade will revolutionize smart metering, Information and communications technology (ICT) and home automation by making it affordable, efficient and within the common man's reach. World over, tremendous work is going on in Advanced Metering Infrastructure (AMI), Smart Metering and Home Automation. Short distance Radio Frequency (RF) technologies like ZigBee#, Z-Wave#, Low Power Radio and Distribution Line Carrier (DLC) are ready to enter every household as the Home Area Network (HAN) of the future. Countries like USA, Australia and Italy etc have already started using AMI solutions while countries like China, South Korea, Austria, Spain, Sweden, Finland, Denmark, Netherlands, Norway, Ireland and UK are in process of implementing AMI [9]. In India under the Restructured Accelerated Power Development & Reform Program (R-APDRP), in the XI five year plan, smart metering and ICT solutions have been planned to increase efficiency, loss reduction, reduce energy theft and for efficient data collection for better energy accounting in the electrical sector. This is the beginning of the AMI in India [12].","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio watermarking using combination of multilevel wavelet decomposition, DCT and SVD","authors":"A. Singhal, Anurag Narayan Chaubey, C. Prakash","doi":"10.1109/ETNCC.2011.6255894","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255894","url":null,"abstract":"Digital watermarking is the process of embedding copyrighting information into digital media frame. They are preferred to be imperceptible to the end users. In this paper we propose a novel audio watermarking technique. The algorithm proposed uses multilevel wavelet decomposition, DCT (Discrete Cosine Transform) and SVD (Singular Value Decomposition) to achieve robustness and inaudibility. Audio Quality parameters (metrics) are calculated and analyzed after applying various attacks on the watermarked signal.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Woofer design for optimal sound output","authors":"V. Sharma, G. Marwaha, S. Agrawal","doi":"10.1109/ETNCC.2011.6255898","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255898","url":null,"abstract":"While designing a speaker a trade-off has to be maintained between the amplification and the power consumed. Improvements in conventional design have been made to improve the damping characteristics but no conclusive work addresses the cumulative problem as described above. The purpose of the current paper is to achieve an optimal sound output by modifying the basic design of the system.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129134385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}