ICTACT Journal on Communication Technology最新文献

筛选
英文 中文
IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK 一种防止虫洞攻击的密码技术的实现
ICTACT Journal on Communication Technology Pub Date : 2019-03-01 DOI: 10.21917/ijct.2019.0283
K. Sundaravadivel
{"title":"IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK","authors":"K. Sundaravadivel","doi":"10.21917/ijct.2019.0283","DOIUrl":"https://doi.org/10.21917/ijct.2019.0283","url":null,"abstract":"Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43718538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DESIGN OF METAMATERIAL INSPIRED HIGH GAIN PATCH ANTENNA 基于超材料的高增益贴片天线设计
ICTACT Journal on Communication Technology Pub Date : 2019-03-01 DOI: 10.21917/ijct.2019.0287
T. Sathiyapriya, V. Gurunathan, A. Shafeek
{"title":"DESIGN OF METAMATERIAL INSPIRED HIGH GAIN PATCH ANTENNA","authors":"T. Sathiyapriya, V. Gurunathan, A. Shafeek","doi":"10.21917/ijct.2019.0287","DOIUrl":"https://doi.org/10.21917/ijct.2019.0287","url":null,"abstract":"","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68378422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QUEUEING ANALYSIS OF MOBILE ADHOC NETWORKS EQUIPPED WITH COGNITIVE RADIO TECHNOLOGY 基于认知无线电技术的移动自组织网络排队分析
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0273
Neeta Singh, Jyoti Singh
{"title":"QUEUEING ANALYSIS OF MOBILE ADHOC NETWORKS EQUIPPED WITH COGNITIVE RADIO TECHNOLOGY","authors":"Neeta Singh, Jyoti Singh","doi":"10.21917/ijct.2018.0273","DOIUrl":"https://doi.org/10.21917/ijct.2018.0273","url":null,"abstract":"In this paper, the Mobile Ad Hoc Networks (MANETs) with integrated Primary/Secondary User (PU or SU) traffic has been considered. Nodes in the MANET are equipped with Cognitive Radio Technology (CRT). The blocking probability and dropping probability for SUs are obtained by considering a 3D Markov Chain analytical model. To provide efficient service to PUs, we offer priority of channels, higher priority and lower priority is given to PUs and SUs, respectively. The expressions for blocking probability, dropping probability, throughput and non-completion of SU are established. Sensitivity analysis is carried out to explore the effect of system parameters. It is observed that Ad Hoc network utilized the unused spectrum of the existing legacy systems in an opportunistic manner in addition to using the unlicensed spectrum. The results show an improved performance in terms of blocking probabilities, dropping probabilities of SU and over all throughput of the system.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46350014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DISTRIBUTED LOAD BALANCING ALGORITHM FOR WIRELESS SENSOR NETWORK 无线传感器网络的分布式负载均衡算法
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0279
K. Navaz, S. Athinarayanan, S. Sameena, R. Kavitha
{"title":"DISTRIBUTED LOAD BALANCING ALGORITHM FOR WIRELESS SENSOR NETWORK","authors":"K. Navaz, S. Athinarayanan, S. Sameena, R. Kavitha","doi":"10.21917/ijct.2018.0279","DOIUrl":"https://doi.org/10.21917/ijct.2018.0279","url":null,"abstract":"A Wireless Sensor Network (WSN) comprises of spatially scattered autonomous sensors to screen physical or natural conditions and to amiably go their information through the system to a Base Station. Grouping is a basic assignment in Wireless Sensor Networks for vitality effectiveness and system quality. Grouping through Central Processing Unit in remote sensor systems is outstanding and being used for quite a while. In this paper, we propose a few procedures that balance the vitality utilization of these hubs and guarantee greatest system lifetime by adjusting the activity stack as similarly as could be expected under the circumstances. Directly grouping through dispersed strategies is being produced for conveying with the issues like system lifetime and vitality. In our work, we connected both concentrated and conveyed kmeans clustering calculation in system test system. K-means is a model based algorithm that surrogates between two noteworthy advances, passing on perceptions to groups and processing cluster focuses until the point when a ceasing standard is satisfied. Improved results are accomplished and related which demonstrate that conveyed clustering is compelling than brought together grouping.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47580291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORK 具有通信黑客框架的传输隧道系统
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0281
S. Kodama, Rei Nakagawa
{"title":"TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORK","authors":"S. Kodama, Rei Nakagawa","doi":"10.21917/ijct.2018.0281","DOIUrl":"https://doi.org/10.21917/ijct.2018.0281","url":null,"abstract":"This paper aims to reduce the transfer restrictions of networks at the transport layer under prohibition-in-principle rules, and to introduce a communication system that virtualizes a programmable network function. The second aim facilitates the realization of the first. Specifically, we target Intranets that restrict transport-layer communications using a firewall. When such an organization’s networks serve multiple departments, external communication to a department is restricted to the available transport number under the rule of the prohibition-in-principle. Our proposed transport proxy system architecture represents the transfer of network applications via well-known protocols such as HTTP (80), using the urgent pointer in the transmission control protocol header. Our architecture improves the flexibility and scalability of the network without requiring complex encapsulation. Finally, the framework is demonstrated through an experimental implementation of the system. Moreover, adding the transport tunneling system offered flexibility while barely affecting the download time of the files.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46627726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INVESTIGATIONS ON PERFORMANCE CHARACTERISTICS OF FBMC: A PHY LAYER FOR NEXT GENERATION TELECOM 面向下一代电信的PHY层FBMC性能特性研究
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0277
R. S. S. Maukthika, P. Namratha, P. Hari
{"title":"INVESTIGATIONS ON PERFORMANCE CHARACTERISTICS OF FBMC: A PHY LAYER FOR NEXT GENERATION TELECOM","authors":"R. S. S. Maukthika, P. Namratha, P. Hari","doi":"10.21917/ijct.2018.0277","DOIUrl":"https://doi.org/10.21917/ijct.2018.0277","url":null,"abstract":"Filter bank multicarrier (FBMC) is one of the proposed physical layers for 5G, which promises to enable future technologies like cognitive radio, robotic automation, virtual reality etc. This paper highlights how FBMC outperforms orthogonal frequency division multiplexing (OFDM) in various aspects such as data rate, spectral efficiency etc. Moreover, it provides a detailed mathematical analysis of polyphase decomposition of filter banks in FBMC and throws light on significance of offset quadrature amplitude modulation (OQAM) in dealing with channel impairments. The significance of massive MIMO systems along with the suitability of FBMC in its application has also been addressed.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41721444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE RESEARCH ON ENERGY EFFICIENT WATCHING METHOD USING CLUSTER HEADER IN WSN 基于簇头的无线传感器网络节能监测方法研究
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0274
Won Chol Jang, Jong Ae Choe, Du Ho Pak
{"title":"THE RESEARCH ON ENERGY EFFICIENT WATCHING METHOD USING CLUSTER HEADER IN WSN","authors":"Won Chol Jang, Jong Ae Choe, Du Ho Pak","doi":"10.21917/ijct.2018.0274","DOIUrl":"https://doi.org/10.21917/ijct.2018.0274","url":null,"abstract":"Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68378116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SINGLE AND DOUBLE ELEMENT PIFA MIMO ANTENNA WITH DGS FOR 5G MOBILE COMMUNICATION 带DGS的单元和双元pifa mimo天线,用于5g移动通信
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0280
C. Supratha, S. Robinson
{"title":"SINGLE AND DOUBLE ELEMENT PIFA MIMO ANTENNA WITH DGS FOR 5G MOBILE COMMUNICATION","authors":"C. Supratha, S. Robinson","doi":"10.21917/ijct.2018.0280","DOIUrl":"https://doi.org/10.21917/ijct.2018.0280","url":null,"abstract":"","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47072365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A NEW CHANNEL ASSIGNMENT METHOD IN COGNITIVE RADIO SYSTEM 认知无线电系统中一种新的信道分配方法
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0275
C. P. Mallikarjuna Gowda, T. Vijayakumar
{"title":"A NEW CHANNEL ASSIGNMENT METHOD IN COGNITIVE RADIO SYSTEM","authors":"C. P. Mallikarjuna Gowda, T. Vijayakumar","doi":"10.21917/ijct.2018.0275","DOIUrl":"https://doi.org/10.21917/ijct.2018.0275","url":null,"abstract":"In this paper, a novel method to estimate the unsuccessful probability is proposed by combining the unnecessary probability and the blocking probability. The Unnecessary probability is the probability when the mobile node is unnecessarily handed over and the blocking probability is the one when the network is not able to assign the channel to the mobile now. A new design of new channel assignment method for cognitive radio system is presented. The first fit method and the random assignment methods are also implemented for the cognitive radio application as a baseline. The PU and SU call blocking are modeled for all the three methods. It is shown that advantages of first fit method and the random assignment methods are combined into the new method, namely, selective assignment method. Simulation are conducted for the various network parameters like number of channels, number of links, load on each link, percentage of the PU versus SU calls etc. It is shown that selective assignment method yields better results than that of the first fit method and the random assignment methods. Finally, the blocking probabilities are combined with the unnecessary handover probabilities of a three-node network to determine the unsuccessful handover probabilities of the first fit, random assignment and selective assignment methods.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48124510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COOPERATIVE SPECTRUM SENSING SCHEME USING FUZZY LOGIC TECHNIQUE 基于模糊逻辑技术的协同频谱感知方案
ICTACT Journal on Communication Technology Pub Date : 2018-12-01 DOI: 10.21917/ijct.2018.0276
Rohit Kantikar, R. Yelalwar
{"title":"COOPERATIVE SPECTRUM SENSING SCHEME USING FUZZY LOGIC TECHNIQUE","authors":"Rohit Kantikar, R. Yelalwar","doi":"10.21917/ijct.2018.0276","DOIUrl":"https://doi.org/10.21917/ijct.2018.0276","url":null,"abstract":"In communication system spectrum has a crucial role and wireless technologies are increasing rapidly it is required to make efficient use of spectrum to satisfy the spectrum scarcity problem. Using spectrum efficiently can be done by cognitive radio because of its ability to sense surrounding environment. Cognitive radio sense unoccupied spectrum by detecting the primary users’ presence or absence in the spectrum. Using more than one cognitive radio in the detection process will increase the efficiency of spectrum usage and prevent interference between signals. Using machine learning techniques for the implementation of intelligent cognitive radio increase efficiency and detection performance and detect signal at low SNR condition. Fuzzy logic machine learning technique is implemented which is based on fuzzy membership functions and fusion centre. Energy detection is used to classify signal and noise at each cognitive radio after that each cognitive radio output information convert into membership function and apply fuzzy rules such as algebraic sum, the algebraic product give a final decision about the signal presence or absence. Simulation results show that the proposed system gives much better results compared to the conventional energy detection system and improves the performance of the system.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46595843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信