{"title":"PCAD: Power control attack detection in wireless sensor networks","authors":"U. Prathap, P. D. Shenoy, K. Venugopal","doi":"10.1109/ANTS.2016.7947798","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947798","url":null,"abstract":"Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning of the round for forwarding the packet towards sink. Each node adds its identity in the packet as a routing path marker and encrypts before forwarding to parent. Child node observes the parent, handles acknowledgement from 2-hop distance node and decides the trust on parent based on successful and unsuccessful transactions. Each node sends a trust value report via multiple paths to Sink at the end of the round. Sink identifies the malicious node by comparing trust value report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detect the malicious nodes efficiently and early.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Deshmukh, Payal Mohadikar, K. Lele, Priyanka Verma, Divya Singh, K. P. Ray
{"title":"Ultra-wideband star shaped planar monopole antenna","authors":"A. Deshmukh, Payal Mohadikar, K. Lele, Priyanka Verma, Divya Singh, K. P. Ray","doi":"10.1109/ANTS.2016.7947838","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947838","url":null,"abstract":"A novel design of ultra-wideband star shaped printed monopole antenna is proposed. A star shaped structure is realized by combining triangular shaped planar monopole patch with its inverted configuration. A detailed parametric study of the offset placement of two triangular shaped patches with respect to the patch centroids, variation in distance between the base of composite structure and the ground plane, is presented. To further improve impedance matching composite structure is chopped at the lower vertex point and a parametric study for the offset feed positions is carried out. The proposed antenna yields an optimum bandwidth of more than 8 GHz ranging from less than 2 GHz to more than 10 GHz with a broadside co-polar gain of around 1 to 2 dBi over a complete bandwidth.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing the cost of designing fault-tolerant CDN data centers","authors":"S. Vignesh, Rakesh Tripathi, V. Tamarapalli","doi":"10.1109/ANTS.2016.7947791","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947791","url":null,"abstract":"With an increase in the usage of data centers to power content distribution networks (CDN), minimizing the cost of deployment while handling fault-tolerance has become an important research issue. In this work, we demonstrate the importance of cost-aware capacity provisioning in fault-tolerant CDN data centers (that can tolerate failure at a single site). We propose an optimization model that exploits spatio-temporal variation in the electricity price and demand to minimize the total cost of ownership. We use real-world data to show that the cost reduction can be upto 40% compared to the existing model, which minimizes the expected response time by routing requests to a nearby data center.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"431 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node revocation and key update protocol in wireless sensor networks","authors":"Sarita Agrawal, M. Das","doi":"10.1109/ANTS.2016.7947799","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947799","url":null,"abstract":"Wireless Sensor Network (WSN) consisting of a large number of tiny sensor nodes deployed in unattended hostile environment is vulnerable to various attacks including node capture. An attacker may physically capture, reprogram and redeploy a node in the network. A node, that is victim of capture attack, must be revoked from the network to avoid further insider attacks. In this paper, we present a node revocation and key update protocol in a clustered network setup. The proposed protocol considers that the communication in a clustered network is secured using a common group secret which is distributed by the respective cluster head only to the authorized nodes in the cluster. The protocol uses Chinese remainder theorem based group key broadcast to revoke the victim node and update the group key for remaining valid nodes. The proposed protocol provides secure node revocation, along with forward and backward secrecy, resistance to node collusion, impersonation and replay attacks, in an efficient manner with significantly less communication, computation and storage overhead as compared to the existing node revocation and key update protocols.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable and privacy-preserving authentication protocol for secure vehicular communications","authors":"Shrikant S. Tangade, S. Manvi","doi":"10.1109/ANTS.2016.7947800","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947800","url":null,"abstract":"Most of the existing authentication protocols are based on either asymmetric cryptography like public-key infrastructure (PKI) or symmetric cryptography. The PKI-based authentication protocols are strongly recommended for solving security issues in VANETs. However, they have following shortcomings: (1) lengthy certificates lead to transmission and computation overheads, and (2) lack of privacy-preservation due to revealing of vehicle identity, communicated in broadcasting safety-message. Symmetric cryptography based protocols are faster because of a single secret key and simplicity; however, it does not ensure non-repudiation. In this paper, we present an Efficient, Scalable and Privacy-preserving Authentication (ESPA) protocol for secure vehicular ad hoc networks (VANETs). The protocol employs hybrid cryptography. In ESPA, the asymmetric PKI based pre-authentication and the symmetric hash message authentication code (HMAC) based authentication are adopted during vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communications, respectively. Extensive simulations are conducted to validate proposed ESPA protocol and compared with the existing work based on PKI and HMAC. The performance analysis showed that ESPA is more efficient, scalable and privacy-preserving secured protocol than the existing work.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. A. Ahmad, Bharath Keshavamurthy, K. Narasimha, N. Mahesh, M. Suma
{"title":"Communication system design for white-fi (802.11af)","authors":"A. S. A. Ahmad, Bharath Keshavamurthy, K. Narasimha, N. Mahesh, M. Suma","doi":"10.1109/ANTS.2016.7947805","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947805","url":null,"abstract":"“Four and half billion people around the world still aren't connected to the Internet!” The gap between India's rural and urban areas, both economically and technologically, is enormous. It is quite obvious that the economic imbalance between India's metros and her villages is the most significant reason for miserable Internet adoption statistics currently found in the country's rural areas. People in the metropolitan cities enjoy the utilities offered by the Internet as a routine privilege while their rural counterparts are yet to come to terms with the convenience and efficiency of the Internet. Many government projects such as the NOFN (National Optical Fiber Network) and the APSFL (AP State Fiber Network Limited) meant to solve this divide are awfully slow and would undoubtedly encounter numerous cost overruns. A solution to this problem would be to tap into the potential of the unused TV spectrum and use it to provide Wi-Fi based broadband connectivity to geographically remote regions of the country. A key factor in deploying such a solution would be to design the related hardware effectively, as described in this paper. The hardware discussed consists of a UHF translator to up/down convert the 2.4 GHz Wi-Fi signals to the appropriate unused TV band in the UHF spectrum. We operate in the UHF Band-IV which extends from 470–582 MHz and comprises 14 channels of 8MHz each. The first section of this article provides a brief overview of the motivation behind our work and the potential applications of the proposed hardware prototype. In the second section, we present a brief description of the project and associated novelty when compared to existing state-of-the-art in the field of White Space communication. In the third section, the UHF translator design is outlined. The third section of this paper also talks about the Raised Cosine Filter and its roll-off factor, which is a primary constraint to ensure design compliance with the IEEE 802.11af standard. In the fourth section, the metrics of the FPGA-based UHF translator employing a Programmable Wideband Mixer with Integrated VCOs (Analog Devices ADRF6655), is described.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128385561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A probabilistic anomaly detection scheme to detect DHCP starvation attacks","authors":"Nikhil Tripathi, N. Hubballi","doi":"10.1109/ANTS.2016.7947848","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947848","url":null,"abstract":"Dynamic Host Configuration Protocol (DHCP) is used by clients in a network to configure their interface with IP address. DHCP is vulnerable to a popularly known Denial of Service (DoS) attack called DHCP starvation attack. In this paper, we highlight the practical difficulties of creating conventional starvation attack in wireless networks (802.11) and also describe two new variations of attacks which can be easily launched in wireless networks. Subsequently, we also propose an anomaly detection system which can detect all variations of starvation attacks. This anomaly detection system generates a probability distribution of various DHCP messages collected from a particular network as a normal profile and subsequently compare the current activity to this profile to detect starvation attacks. We experiment with different types of starvation attacks in a real network setup and report detection performance of our proposed method.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of OFDM mmWave communications with compressive sensing based channel estimation and impulse noise suppression","authors":"P. Korrai, D. Sen","doi":"10.1109/ANTS.2016.7947867","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947867","url":null,"abstract":"Millimeter Wave (mmWave) channel estimation can be treated as a sparse signal recovery problem due to the sparse multipath characteristics of the channel. Utilizing compressive sensing (CS) theory, sparse signal recovery algorithms can be designed for channel estimation. However, these algorithms are sensitive to impulse noise, and hence the estimation accuracy degrades under non Gaussian noise. In this paper, we propose a novel algorithm for suppression of impulse noise to improve the system performance. The CS based channel estimation algorithms using pilot subcarriers of orthogonal frequency division multiplexing (OFDM) symbols in conjunction with the proposed impulse noise suppression method is utilized to evaluate the system performance over 60 GHz sparse channels. The mean square error (MSE) and bit error rate (BER) are considered as performance metrics. Comparison with the least squares (LS) estimation method using 4 quadrature amplitude modulation (QAM) OFDM symbols proves the efficacy of the proposed technique.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"167 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125977280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of filtered PSM signal using non-matched receiver for UWB communication","authors":"S. Sharma, V. Bhatia","doi":"10.1109/ANTS.2016.7947771","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947771","url":null,"abstract":"Pulse shape modulation (PSM) is new and one of the best modulation scheme for Ultra-wideband (UWB) communication due to its low interference, multi-dimension data transmission and asynchronous demodulation features. The PSM scheme uses orthogonal pulses for data transmission as reported in the UWB literature. It is also known that the pulse geometry can change significantly by passing through a filter. This filter can be represented as an amplifier, transceiver antenna effect, pulse shaping filter, frequency selective pulse shape distortion, multipath channel and other system model effects. In this paper, theoretical analysis of the bit error rate (BER) performance of filtered 2-ary PSM signal has been carried out and verified with simulation results. Due to filter effect, the transmitted pulses are no longer orthogonal at the receiver, therefore design of the matched receiver is complex. In literature, a non-matched receiver is suggested, which is valid only for composite Hermite pulses (CHP) and has high bit error probability. A simple non-matched receiver for orthogonal pulses for PSM scheme in UWB communication is proposed, which is valid for CHP and other orthogonal pulses. The proposed non-matched filter receiver is simple and can be used for both filtered and non-filtered PSM signals demodulation as verified by the simulations.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of optical fronthauling techniques for centralized radio access network","authors":"A. Delmade, D. Venkitesh, R. D. Koilpillai","doi":"10.1109/ANTS.2016.7947836","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947836","url":null,"abstract":"This work presents performance comparison of three schemes for fronthauling in Centralized Radio Access Network Architecture (C-RAN) namely, Digitized Baseband over Fiber (DBBoF), Analog Intermediate Frequency over Fiber (AIFoF) and Digitized Intermediate Frequency over Fiber (DIFoF). The SNR and optical power requirements for each of these schemes for a transmission of 20 MHz and 160 MHz WLAN signals through an AWGN wireless channel are compared through simulations. Results indicates that DBBoF and DIFoF techniques require 5 dBm smaller optical power than AIFoF to require same SNR of 17 dB to achieve BER of 10−3 for 20 MHz signal. For 160 MHz signal DBBoF yields a better performance compared to AIFoF for the same optical power levels, but requires larger line rates.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}